++ echo 'Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/logs/disabled-auth.log' Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/logs/disabled-auth.log ++ '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/cloud-secret.yml ']' ++ SKIP_BACKUPS_TO_AWS_GCP_AZURE= ++ oc get projects ++ kubectl get nodes ++ grep '^minikube' +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep -eks- Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 ++ '[' ']' ++ EKS=0 +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep gke Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 ++ '[' v1.32.13-gke.1258000 ']' ++ GKE=1 +++ kubectl version -o json +++ jq -r '.serverVersion.major + "." + .serverVersion.minor' +++ /usr/sbin/sed -r 's/[^0-9.]+//g' Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 ++ KUBE_VERSION=1.32 + set_debug + [[ 1 == 1 ]] + set -o xtrace + custom_port=27019 + create_infra disabled-auth-30730 + local ns=disabled-auth-30730 + [[ 1 == 1 ]] + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.hjmZyheEx7 ++ mktemp + local LAST_ERR=/tmp/tmp.ECcgXYYc55 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hjmZyheEx7 customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.ECcgXYYc55 + rm /tmp/tmp.hjmZyheEx7 /tmp/tmp.ECcgXYYc55 + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml ++ grep -v '\-\-\-' grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + grep -v NAMESPACE + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.jq7Ysyh3qM ++ mktemp + local LAST_ERR=/tmp/tmp.VygeqisMGa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jq7Ysyh3qM + cat /tmp/tmp.VygeqisMGa + rm /tmp/tmp.jq7Ysyh3qM /tmp/tmp.VygeqisMGa + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.YKns3hEA2A ++ mktemp + local LAST_ERR=/tmp/tmp.z4egR0DlzY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YKns3hEA2A + cat /tmp/tmp.z4egR0DlzY + rm /tmp/tmp.YKns3hEA2A /tmp/tmp.z4egR0DlzY + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.SKIf7mHeeS ++ mktemp + local LAST_ERR=/tmp/tmp.WVYrvQycyT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SKIf7mHeeS + cat /tmp/tmp.WVYrvQycyT + rm /tmp/tmp.SKIf7mHeeS /tmp/tmp.WVYrvQycyT + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.50xZtE5K6R ++ mktemp + local LAST_ERR=/tmp/tmp.zrYTVGDOiE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.50xZtE5K6R clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.zrYTVGDOiE + rm /tmp/tmp.50xZtE5K6R /tmp/tmp.zrYTVGDOiE + return 0 + check_crd_for_deletion PR-2256-98b7d85f + local git_tag=PR-2256-98b7d85f ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-2256-98b7d85f/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/sbin/sed s/---//g ++ /usr/sbin/sed ':a;N;$!ba;s/\n/ /g' + for crd_name in $(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '.metadata.name' | $sed 's/---//g' | $sed ':a;N;$!ba;s/\n/ /g') ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.H8CETOiV2f +++ mktemp ++ local LAST_ERR=/tmp/tmp.6xkzcDB9qR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.H8CETOiV2f ++ cat /tmp/tmp.6xkzcDB9qR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.H8CETOiV2f ++ cat /tmp/tmp.6xkzcDB9qR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.H8CETOiV2f ++ cat /tmp/tmp.6xkzcDB9qR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.H8CETOiV2f ++ cat /tmp/tmp.6xkzcDB9qR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.H8CETOiV2f /tmp/tmp.6xkzcDB9qR ++ return 1 + [[ '' == Terminating ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get clusterrolebinding ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + kubectl_bin get ns + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found + awk '{print$1}' + xargs kubectl delete ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.SINjqtvXLZ ++ mktemp + local LAST_OUT=/tmp/tmp.520JTt9yRn ++ mktemp + local LAST_ERR=/tmp/tmp.zBzfvvziKf + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.BUYHNcm34o + local exit_status=0 + local timeout=4 ++ seq 0 2 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + for i in $(seq 0 2) + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SINjqtvXLZ + cat /tmp/tmp.zBzfvvziKf + rm /tmp/tmp.SINjqtvXLZ /tmp/tmp.zBzfvvziKf + return 0 namespace "disabled-auth-28922" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.520JTt9yRn namespace "psmdb-operator" deleted + cat /tmp/tmp.BUYHNcm34o + rm /tmp/tmp.520JTt9yRn /tmp/tmp.BUYHNcm34o + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.viv5FaNPpg ++ mktemp + local LAST_ERR=/tmp/tmp.iDlvmbvey2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.viv5FaNPpg + cat /tmp/tmp.iDlvmbvey2 + rm /tmp/tmp.viv5FaNPpg /tmp/tmp.iDlvmbvey2 + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.75nZQvpvhJ ++ mktemp + local LAST_ERR=/tmp/tmp.yoH60rT4TZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.75nZQvpvhJ namespace/psmdb-operator created + cat /tmp/tmp.yoH60rT4TZ + rm /tmp/tmp.75nZQvpvhJ /tmp/tmp.yoH60rT4TZ + return 0 + set_kube_ctx psmdb-operator + local namespace=psmdb-operator ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.3pn95JivqQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.WI0aEW9mTK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3pn95JivqQ ++ cat /tmp/tmp.WI0aEW9mTK ++ rm /tmp/tmp.3pn95JivqQ /tmp/tmp.WI0aEW9mTK ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.wNFKpu9BZM ++ mktemp + local LAST_ERR=/tmp/tmp.zeholTItsX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wNFKpu9BZM Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14" modified. + cat /tmp/tmp.zeholTItsX + rm /tmp/tmp.wNFKpu9BZM /tmp/tmp.zeholTItsX + return 0 + deploy_operator + desc 'start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2256-98b7d85f' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2256-98b7d85f ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.hnnHrj7nrw ++ mktemp + local LAST_ERR=/tmp/tmp.hnaUVEreRC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hnnHrj7nrw customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.hnaUVEreRC + rm /tmp/tmp.hnnHrj7nrw /tmp/tmp.hnaUVEreRC + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-rbac.yaml + kubectl_bin apply -n psmdb-operator -f - + sed -e 's^namespace: .*^namespace: psmdb-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.HDtdmwx01R ++ mktemp + local LAST_ERR=/tmp/tmp.tgqhaAB7lW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HDtdmwx01R clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.tgqhaAB7lW + rm /tmp/tmp.HDtdmwx01R /tmp/tmp.tgqhaAB7lW + return 0 + yq eval $'\n\t\t\t(.spec.template.spec.containers[].image = "docker.io/perconalab/percona-server-mongodb-operator:PR-2256-98b7d85f") |\n\t\t\t((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") |\n\t\t\t((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-operator.yaml + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.0zm04KSP7r ++ mktemp + local LAST_ERR=/tmp/tmp.Jz3TOLlHV6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0zm04KSP7r deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.Jz3TOLlHV6 + rm /tmp/tmp.0zm04KSP7r /tmp/tmp.Jz3TOLlHV6 + return 0 + sleep 20 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZgqUjjFp3v +++ mktemp ++ local LAST_ERR=/tmp/tmp.quS05LKVym ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZgqUjjFp3v ++ cat /tmp/tmp.quS05LKVym ++ rm /tmp/tmp.ZgqUjjFp3v /tmp/tmp.quS05LKVym ++ return 0 + wait_operator_pod percona-server-mongodb-operator-7d9c7747d9-fqhdb + local pod=percona-server-mongodb-operator-7d9c7747d9-fqhdb + set +o xtrace waiting for pod/percona-server-mongodb-operator-7d9c7747d9-fqhdb to be ready.OK + echo 'Print operator info from log' Print operator info from log ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator + grep 'Manager starting up' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nASHPIJkri +++ mktemp ++ local LAST_ERR=/tmp/tmp.dcOlocNPWN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nASHPIJkri ++ cat /tmp/tmp.dcOlocNPWN ++ rm /tmp/tmp.nASHPIJkri /tmp/tmp.dcOlocNPWN ++ return 0 + kubectl_bin logs -n psmdb-operator percona-server-mongodb-operator-7d9c7747d9-fqhdb ++ mktemp + local LAST_OUT=/tmp/tmp.QRnNKjOKgq ++ mktemp + local LAST_ERR=/tmp/tmp.waDsfE4LGp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl logs -n psmdb-operator percona-server-mongodb-operator-7d9c7747d9-fqhdb + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QRnNKjOKgq + cat /tmp/tmp.waDsfE4LGp + rm /tmp/tmp.QRnNKjOKgq /tmp/tmp.waDsfE4LGp + return 0 2026-04-14T11:10:08.095Z INFO setup Manager starting up {"gitCommit": "98b7d85f6fc9316ce5207960e26f4bbf2b33bfd3", "gitBranch": "PR-2256-98b7d85f", "buildTime": "", "goVersion": "go1.25.9", "os": "linux", "arch": "amd64"} + create_namespace disabled-auth-30730 + local namespace=disabled-auth-30730 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces disabled-auth-30730' ++ mktemp + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces disabled-auth-30730 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace disabled-auth-30730 --ignore-not-found + xargs kubectl delete ns + local LAST_OUT=/tmp/tmp.yRAlbAWOj5 ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.zE7O3H9QfQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_OUT=/tmp/tmp.QAAKRKxsrb + for i in $(seq 0 2) + set +e + kubectl get ns ++ mktemp + local LAST_ERR=/tmp/tmp.qldhdFkIDf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete namespace disabled-auth-30730 --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.yRAlbAWOj5 + cat /tmp/tmp.zE7O3H9QfQ + rm /tmp/tmp.yRAlbAWOj5 /tmp/tmp.zE7O3H9QfQ + return 0 error: resource(s) were provided, but no name was specified + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QAAKRKxsrb + cat /tmp/tmp.qldhdFkIDf + rm /tmp/tmp.QAAKRKxsrb /tmp/tmp.qldhdFkIDf + return 0 + kubectl_bin wait --for=delete namespace disabled-auth-30730 ++ mktemp + local LAST_OUT=/tmp/tmp.KUg1i3ON1u ++ mktemp + local LAST_ERR=/tmp/tmp.yM9xBm8VmN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace disabled-auth-30730 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KUg1i3ON1u + cat /tmp/tmp.yM9xBm8VmN + rm /tmp/tmp.KUg1i3ON1u /tmp/tmp.yM9xBm8VmN + return 0 + desc 'create namespace disabled-auth-30730' + set +o xtrace ----------------------------------------------------------------------------------- create namespace disabled-auth-30730 ----------------------------------------------------------------------------------- + kubectl_bin create namespace disabled-auth-30730 ++ mktemp + local LAST_OUT=/tmp/tmp.QtHNYLphuR ++ mktemp + local LAST_ERR=/tmp/tmp.Fox85OJLuY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace disabled-auth-30730 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QtHNYLphuR namespace/disabled-auth-30730 created + cat /tmp/tmp.Fox85OJLuY + rm /tmp/tmp.QtHNYLphuR /tmp/tmp.Fox85OJLuY + return 0 + set_kube_ctx disabled-auth-30730 + local namespace=disabled-auth-30730 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.goSAZlApAs +++ mktemp ++ local LAST_ERR=/tmp/tmp.FYswFqFuDY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.goSAZlApAs ++ cat /tmp/tmp.FYswFqFuDY ++ rm /tmp/tmp.goSAZlApAs /tmp/tmp.FYswFqFuDY ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14 --namespace=disabled-auth-30730 ++ mktemp + local LAST_OUT=/tmp/tmp.iQYCUcSAY5 ++ mktemp + local LAST_ERR=/tmp/tmp.6YZKeaf28c + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14 --namespace=disabled-auth-30730 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iQYCUcSAY5 Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2256-98b7d85f-7-cluster14" modified. + cat /tmp/tmp.6YZKeaf28c + rm /tmp/tmp.iQYCUcSAY5 /tmp/tmp.6YZKeaf28c + return 0 + deploy_minio + local cert_secret= + local service_name=minio-service + desc 'install MinIO: minio-service' + set +o xtrace ----------------------------------------------------------------------------------- install MinIO: minio-service ----------------------------------------------------------------------------------- + helm uninstall minio-service + : + helm repo remove minio "minio" has been removed from your repositories + helm repo add minio https://charts.min.io/ "minio" has been added to your repositories + local endpoint=http://minio-service:9000 + minio_args=('--version' '5.4.0' '--set' 'replicas=1' '--set' 'mode=standalone' '--set' 'resources.requests.memory=256Mi' '--set' 'rootUser=rootuser' '--set' 'rootPassword=rootpass123' '--set' 'users[0].accessKey=some-access-key' '--set' 'users[0].secretKey=some-secret-key' '--set' 'users[0].policy=consoleAdmin' '--set' 'service.type=ClusterIP' '--set' 'configPathmc=/tmp/' '--set' 'securityContext.enabled=false' '--set' 'persistence.size=2G' '--set' 'fullnameOverride=minio-service' '--set' 'serviceAccount.create=true' '--set' 'serviceAccount.name=minio-service-sa') + local minio_args + [[ -n '' ]] + retry 10 60 helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/ --set securityContext.enabled=false --set persistence.size=2G --set fullnameOverride=minio-service --set serviceAccount.create=true --set serviceAccount.name=minio-service-sa minio/minio + local max=10 + local delay=60 + shift 2 + local n=1 + helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/ --set securityContext.enabled=false --set persistence.size=2G --set fullnameOverride=minio-service --set serviceAccount.create=true --set serviceAccount.name=minio-service-sa minio/minio NAME: minio-service LAST DEPLOYED: Tue Apr 14 11:10:47 2026 NAMESPACE: disabled-auth-30730 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.disabled-auth-30730.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace disabled-auth-30730 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace disabled-auth-30730 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace disabled-auth-30730 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace disabled-auth-30730 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local ++ kubectl_bin get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UWgF5IIEVC +++ mktemp ++ local LAST_ERR=/tmp/tmp.xIP2CLH6oI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UWgF5IIEVC ++ cat /tmp/tmp.xIP2CLH6oI ++ rm /tmp/tmp.UWgF5IIEVC /tmp/tmp.xIP2CLH6oI ++ return 0 + local MINIO_POD=minio-service-6d5f646cdc-x68gz + wait_pod minio-service-6d5f646cdc-x68gz + local pod=minio-service-6d5f646cdc-x68gz + set +o xtrace waiting for pod/minio-service-6d5f646cdc-x68gz to be ready.OK + '[' -n psmdb-operator ']' + kubectl_bin create svc -n psmdb-operator externalname minio-service --external-name=minio-service.disabled-auth-30730.svc.cluster.local --tcp=9000 service/minio-service created + create_minio_bucket operator-testing http://minio-service:9000 + local bucket=operator-testing + local endpoint=http://minio-service:9000 + kubectl_bin run -i --rm aws-cli --image=docker.io/perconalab/awscli --restart=Never -- bash -c $'AWS_ACCESS_KEY_ID=some-access-key \t\tAWS_SECRET_ACCESS_KEY=some-secret-key \t\tAWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --no-verify-ssl --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' ++ mktemp + local LAST_OUT=/tmp/tmp.bXtz4SzHxD ++ mktemp + local LAST_ERR=/tmp/tmp.mXoLVdn56a + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl run -i --rm aws-cli --image=docker.io/perconalab/awscli --restart=Never -- bash -c $'AWS_ACCESS_KEY_ID=some-access-key \t\tAWS_SECRET_ACCESS_KEY=some-secret-key \t\tAWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --no-verify-ssl --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bXtz4SzHxD pod "aws-cli" deleted from disabled-auth-30730 namespace + cat /tmp/tmp.mXoLVdn56a All commands and output from this session will be recorded in container logs, including credentials and sensitive information passed through the command prompt. If you don't see a command prompt, try pressing enter. + rm /tmp/tmp.bXtz4SzHxD /tmp/tmp.mXoLVdn56a + return 0 + desc 'create PSMDB sharded cluster without auth' + set +o xtrace ----------------------------------------------------------------------------------- create PSMDB sharded cluster without auth ----------------------------------------------------------------------------------- + cluster=some-name + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.5TzXtilbD2 ++ mktemp + local LAST_ERR=/tmp/tmp.wTyTxWqwIU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5TzXtilbD2 secret/some-users created + cat /tmp/tmp.wTyTxWqwIU + rm /tmp/tmp.5TzXtilbD2 /tmp/tmp.wTyTxWqwIU + return 0 + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.Kb6CXlYmab ++ mktemp + local LAST_ERR=/tmp/tmp.KbxOVnp4gM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Kb6CXlYmab deployment.apps/psmdb-client created + cat /tmp/tmp.KbxOVnp4gM + rm /tmp/tmp.Kb6CXlYmab /tmp/tmp.KbxOVnp4gM + return 0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.SQ9zbkQ3NU ++ mktemp + local LAST_ERR=/tmp/tmp.CS6u2Ywatj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SQ9zbkQ3NU secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created secret/gcp-cs-sa-key-secret created + cat /tmp/tmp.CS6u2Ywatj + rm /tmp/tmp.SQ9zbkQ3NU /tmp/tmp.CS6u2Ywatj + return 0 + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-no-auth.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-no-auth.yml + kubectl_bin apply -f - ++ mktemp + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-no-auth.yml + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2256-98b7d85f"' + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + /usr/sbin/sed -e s/NAME_SPACE/disabled-auth-30730/g + local LAST_OUT=/tmp/tmp.qCVE9yDEDb + yq eval '.spec.upgradeOptions.apply="Never"' ++ mktemp + local LAST_ERR=/tmp/tmp.zJovzEc5WP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.qCVE9yDEDb perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.zJovzEc5WP + rm /tmp/tmp.qCVE9yDEDb /tmp/tmp.zJovzEc5WP + return 0 + desc 'wait for all pods to start' + set +o xtrace ----------------------------------------------------------------------------------- wait for all pods to start ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready......OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.......OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FZxa3wA5Go +++ mktemp ++ local LAST_ERR=/tmp/tmp.hZzqOGejA0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FZxa3wA5Go ++ cat /tmp/tmp.hZzqOGejA0 ++ rm /tmp/tmp.FZxa3wA5Go /tmp/tmp.hZzqOGejA0 ++ return 0 + [[ '' == true ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready......OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3frtymZJK1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ja6ojtqZs0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3frtymZJK1 ++ cat /tmp/tmp.ja6ojtqZs0 ++ rm /tmp/tmp.3frtymZJK1 /tmp/tmp.ja6ojtqZs0 ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kia8acylLo +++ mktemp ++ local LAST_ERR=/tmp/tmp.nBrNZGoa2l ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kia8acylLo ++ cat /tmp/tmp.nBrNZGoa2l ++ rm /tmp/tmp.kia8acylLo /tmp/tmp.nBrNZGoa2l ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness...................................... + wait_for_running some-name-rs1 3 + local name=some-name-rs1 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs1 + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-rs1-0 + local pod=some-name-rs1-0 + set +o xtrace waiting for pod/some-name-rs1-0 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-rs1-1 + local pod=some-name-rs1-1 + set +o xtrace waiting for pod/some-name-rs1-1 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b05B4XZBBr +++ mktemp ++ local LAST_ERR=/tmp/tmp.gkkhUnUel5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b05B4XZBBr ++ cat /tmp/tmp.gkkhUnUel5 ++ rm /tmp/tmp.b05B4XZBBr /tmp/tmp.gkkhUnUel5 ++ return 0 + [[ '' == true ]] + wait_pod some-name-rs1-2 + local pod=some-name-rs1-2 + set +o xtrace waiting for pod/some-name-rs1-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2IeG5R19kD +++ mktemp ++ local LAST_ERR=/tmp/tmp.GQLkgJ1iKi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2IeG5R19kD ++ cat /tmp/tmp.GQLkgJ1iKi ++ rm /tmp/tmp.2IeG5R19kD /tmp/tmp.GQLkgJ1iKi ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.o01Qt1lKC7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.gwN2wlJUGK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs1")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.o01Qt1lKC7 ++ cat /tmp/tmp.gwN2wlJUGK ++ rm /tmp/tmp.o01Qt1lKC7 /tmp/tmp.gwN2wlJUGK ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness + wait_for_running some-name-rs2 3 + local name=some-name-rs2 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs2 + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-rs2-0 + local pod=some-name-rs2-0 + set +o xtrace waiting for pod/some-name-rs2-0 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-rs2-1 + local pod=some-name-rs2-1 + set +o xtrace waiting for pod/some-name-rs2-1 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gCHanSBMWA +++ mktemp ++ local LAST_ERR=/tmp/tmp.2RTKCRpUBY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gCHanSBMWA ++ cat /tmp/tmp.2RTKCRpUBY ++ rm /tmp/tmp.gCHanSBMWA /tmp/tmp.2RTKCRpUBY ++ return 0 + [[ '' == true ]] + wait_pod some-name-rs2-2 + local pod=some-name-rs2-2 + set +o xtrace waiting for pod/some-name-rs2-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QOJ0xqpaCs +++ mktemp ++ local LAST_ERR=/tmp/tmp.DY82zOPzB5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QOJ0xqpaCs ++ cat /tmp/tmp.DY82zOPzB5 ++ rm /tmp/tmp.QOJ0xqpaCs /tmp/tmp.DY82zOPzB5 ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ltoqHDb2LQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.MSfCdS0STx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs2")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ltoqHDb2LQ ++ cat /tmp/tmp.MSfCdS0STx ++ rm /tmp/tmp.ltoqHDb2LQ /tmp/tmp.MSfCdS0STx ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8pqog8QpUt +++ mktemp ++ local LAST_ERR=/tmp/tmp.xprQT7qUZm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8pqog8QpUt ++ cat /tmp/tmp.xprQT7qUZm ++ rm /tmp/tmp.8pqog8QpUt /tmp/tmp.xprQT7qUZm ++ return 0 + [[ '' == true ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0rgLL7iWTC +++ mktemp ++ local LAST_ERR=/tmp/tmp.cJb3JvTUy7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0rgLL7iWTC ++ cat /tmp/tmp.cJb3JvTUy7 ++ rm /tmp/tmp.0rgLL7iWTC /tmp/tmp.cJb3JvTUy7 ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZOQXKKsMpJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.I1AbtI9EqI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZOQXKKsMpJ ++ cat /tmp/tmp.I1AbtI9EqI ++ rm /tmp/tmp.ZOQXKKsMpJ /tmp/tmp.I1AbtI9EqI ++ return 0 + [[ '' == true ]] + sleep 10 + [[ false == true ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SfYza3Jv6s +++ mktemp ++ local LAST_ERR=/tmp/tmp.By0xTuoCEh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SfYza3Jv6s ++ cat /tmp/tmp.By0xTuoCEh ++ rm /tmp/tmp.SfYza3Jv6s /tmp/tmp.By0xTuoCEh ++ return 0 + [[ '' == true ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8oXZ58WjHV +++ mktemp ++ local LAST_ERR=/tmp/tmp.bAJwkH9Jb1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8oXZ58WjHV ++ cat /tmp/tmp.bAJwkH9Jb1 ++ rm /tmp/tmp.8oXZ58WjHV /tmp/tmp.bAJwkH9Jb1 ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.o7fMyzmJzb +++ mktemp ++ local LAST_ERR=/tmp/tmp.ou6UY1BpTM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.o7fMyzmJzb ++ cat /tmp/tmp.ou6UY1BpTM ++ rm /tmp/tmp.o7fMyzmJzb /tmp/tmp.ou6UY1BpTM ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness + desc 'write data without auth' + set +o xtrace ----------------------------------------------------------------------------------- write data without auth ----------------------------------------------------------------------------------- + run_mongos 'use myApp\n db.createCollection("test")' @some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.createCollection("test")' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wxZAY9v7Hn +++ mktemp ++ local LAST_ERR=/tmp/tmp.0x9DkUpmx9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wxZAY9v7Hn ++ cat /tmp/tmp.0x9DkUpmx9 ++ rm /tmp/tmp.wxZAY9v7Hn /tmp/tmp.0x9DkUpmx9 ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.createCollection("test")\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.3d5WC6fevm ++ mktemp + local LAST_ERR=/tmp/tmp.derez4hcuS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.createCollection("test")\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3d5WC6fevm Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("b51d2b2c-824d-4afc-990c-8c171fb1a039") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1776165332, 12), "signature" : { "hash" : BinData(0,"AAAAAAAAAAAAAAAAAAAAAAAAAAA="), "keyId" : NumberLong(0) } }, "operationTime" : Timestamp(1776165332, 12) } bye + cat /tmp/tmp.derez4hcuS + rm /tmp/tmp.3d5WC6fevm /tmp/tmp.derez4hcuS + return 0 + run_mongos 'use myApp\n db.test.insert({x: 100500})' @some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({x: 100500})' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lzOnhsTiug +++ mktemp ++ local LAST_ERR=/tmp/tmp.dai0pO4Oik ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lzOnhsTiug ++ cat /tmp/tmp.dai0pO4Oik ++ rm /tmp/tmp.lzOnhsTiug /tmp/tmp.dai0pO4Oik ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 100500})\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.MDWXlR3Enx ++ mktemp + local LAST_ERR=/tmp/tmp.i901vSvZ1x + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 100500})\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MDWXlR3Enx Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c0b1b0da-363b-4568-8f21-4499af9dbd10") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.i901vSvZ1x + rm /tmp/tmp.MDWXlR3Enx /tmp/tmp.i901vSvZ1x + return 0 + desc 'verify data was written' + set +o xtrace ----------------------------------------------------------------------------------- verify data was written ----------------------------------------------------------------------------------- + run_mongos 'use myApp\n db.test.find()' @some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yD1drUvSCT +++ mktemp ++ local LAST_ERR=/tmp/tmp.3L8G8fHOaN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yD1drUvSCT ++ cat /tmp/tmp.3L8G8fHOaN ++ rm /tmp/tmp.yD1drUvSCT /tmp/tmp.3L8G8fHOaN ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.KxnIMkQtsI ++ mktemp + local LAST_ERR=/tmp/tmp.nPTaSxtdmd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KxnIMkQtsI Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("958b9939-5610-4077-930f-7ac295df2926") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp { "_id" : ObjectId("69de21d6310d99195f7cf4f9"), "x" : 100500 } bye + cat /tmp/tmp.nPTaSxtdmd + rm /tmp/tmp.KxnIMkQtsI /tmp/tmp.nPTaSxtdmd + return 0 + desc 'wait for backup agents' + set +o xtrace ----------------------------------------------------------------------------------- wait for backup agents ----------------------------------------------------------------------------------- + wait_backup_agent some-name-rs0-0 + local agent_pod=some-name-rs0-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs0-0...2026-04-14T11:14:00.000+0000 I listening for the commands + wait_backup_agent some-name-rs1-0 + local agent_pod=some-name-rs1-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs1-0...2026-04-14T11:14:01.000+0000 I listening for the commands + wait_backup_agent some-name-rs2-0 + local agent_pod=some-name-rs2-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs2-0...2026-04-14T11:14:04.000+0000 I listening for the commands + backup_name_no_auth=backup-no-auth + desc 'run backup without auth' + set +o xtrace ----------------------------------------------------------------------------------- run backup without auth ----------------------------------------------------------------------------------- + run_backup minio backup-no-auth + local storage=minio + local backup_name=backup-no-auth + local type=logical + log 'running backup backup-no-auth' + set +o xtrace [2026-04-14T11:15:40+0000] running backup backup-no-auth + yq eval $'.metadata.name = "backup-no-auth"\n\t\t\t| .spec.storageName = "minio"\n\t\t\t| .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/backup-minio.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.IPUrVh1iP3 ++ mktemp + local LAST_ERR=/tmp/tmp.pDgltPKq1w + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.IPUrVh1iP3 perconaservermongodbbackup.psmdb.percona.com/backup-no-auth created + cat /tmp/tmp.pDgltPKq1w + rm /tmp/tmp.IPUrVh1iP3 /tmp/tmp.pDgltPKq1w + return 0 + wait_backup backup-no-auth + local backup_name=backup-no-auth + local target_state=ready + set +o xtrace waiting for backup-no-auth to reach ready state...............OK + desc 'insert new data without auth' + set +o xtrace ----------------------------------------------------------------------------------- insert new data without auth ----------------------------------------------------------------------------------- + run_mongos 'use myApp\n db.test.insert({x: 100501})' @some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({x: 100501})' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.A0FD7YxfF7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.K5ZtLNOxBt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.A0FD7YxfF7 ++ cat /tmp/tmp.K5ZtLNOxBt ++ rm /tmp/tmp.A0FD7YxfF7 /tmp/tmp.K5ZtLNOxBt ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 100501})\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.hEjLZo6qcC ++ mktemp + local LAST_ERR=/tmp/tmp.UZikjPAMRk + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 100501})\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hEjLZo6qcC Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5d5e44d6-9fc6-485d-8b45-82be31496ca3") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.UZikjPAMRk + rm /tmp/tmp.hEjLZo6qcC /tmp/tmp.UZikjPAMRk + return 0 + desc 'verify new data exists' + set +o xtrace ----------------------------------------------------------------------------------- verify new data exists ----------------------------------------------------------------------------------- + compare_mongos_cmd find @some-name-mongos.disabled-auth-30730 -after-insert '' myApp test 27019 + local command=find + local uri=@some-name-mongos.disabled-auth-30730 + local postfix=-after-insert + local suffix= + local database=myApp + local collection=test + local port=27019 + local tls=false + [[ false == true ]] + mongos_command=run_mongos + log 'running db.test.command() in myApp' + set +o xtrace [2026-04-14T11:16:12+0000] running db.test.command() in myApp + run_mongos 'use myApp\n db.test.find()' @some-name-mongos.disabled-auth-30730 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vzipcVUjMu +++ mktemp ++ local LAST_ERR=/tmp/tmp.mGiTBKSXUO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vzipcVUjMu ++ cat /tmp/tmp.mGiTBKSXUO ++ rm /tmp/tmp.vzipcVUjMu /tmp/tmp.mGiTBKSXUO ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.28OFLrTMkU ++ mktemp + local LAST_ERR=/tmp/tmp.DSCiBzq9Xd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.28OFLrTMkU + cat /tmp/tmp.DSCiBzq9Xd + rm /tmp/tmp.28OFLrTMkU /tmp/tmp.DSCiBzq9Xd + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/compare/find-after-insert.json /tmp/tmp.yuUMqVy3ER/find-after-insert + desc 'restore from backup (no auth)' + set +o xtrace ----------------------------------------------------------------------------------- restore from backup (no auth) ----------------------------------------------------------------------------------- + run_restore backup-no-auth + local backup_name=backup-no-auth + local restore_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/restore.yml + log 'running restore restore-backup-no-auth' + set +o xtrace [2026-04-14T11:16:14+0000] running restore restore-backup-no-auth + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/restore.yml + /usr/sbin/sed -e 's/name:/name: restore-backup-no-auth/' + /usr/sbin/sed -e 's/backupName:/backupName: backup-no-auth/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.hXahpzRY6B ++ mktemp + local LAST_ERR=/tmp/tmp.RAF4kI1gzg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hXahpzRY6B perconaservermongodbrestore.psmdb.percona.com/restore-backup-no-auth created + cat /tmp/tmp.RAF4kI1gzg + rm /tmp/tmp.hXahpzRY6B /tmp/tmp.RAF4kI1gzg + return 0 + wait_restore backup-no-auth some-name + local backup_name=backup-no-auth + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-no-auth object to be created.OK Waiting psmdb-restore/restore-backup-no-auth to reach state "ready" .OK after 0 minutes + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VlBGsRIYHJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.ifm2I4hZds ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VlBGsRIYHJ ++ cat /tmp/tmp.ifm2I4hZds ++ rm /tmp/tmp.VlBGsRIYHJ /tmp/tmp.ifm2I4hZds ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CQconzHF8B +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ao9NeJDIob ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CQconzHF8B ++ cat /tmp/tmp.Ao9NeJDIob ++ rm /tmp/tmp.CQconzHF8B /tmp/tmp.Ao9NeJDIob ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C5zSHpZrXj +++ mktemp ++ local LAST_ERR=/tmp/tmp.qCzZ9CO3qD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C5zSHpZrXj ++ cat /tmp/tmp.qCzZ9CO3qD ++ rm /tmp/tmp.C5zSHpZrXj /tmp/tmp.qCzZ9CO3qD ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w3b1vHFhR2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9hyjH0fTLl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.w3b1vHFhR2 ++ cat /tmp/tmp.9hyjH0fTLl ++ rm /tmp/tmp.w3b1vHFhR2 /tmp/tmp.9hyjH0fTLl ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2BD081Kb0d +++ mktemp ++ local LAST_ERR=/tmp/tmp.A69AEj6MO5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2BD081Kb0d ++ cat /tmp/tmp.A69AEj6MO5 ++ rm /tmp/tmp.2BD081Kb0d /tmp/tmp.A69AEj6MO5 ++ return 0 + [[ ready == ready ]] + echo .OK .OK + desc 'verify data was restored to original state' + set +o xtrace ----------------------------------------------------------------------------------- verify data was restored to original state ----------------------------------------------------------------------------------- + compare_mongos_cmd find @some-name-mongos.disabled-auth-30730 -after-restore '' myApp test 27019 + local command=find + local uri=@some-name-mongos.disabled-auth-30730 + local postfix=-after-restore + local suffix= + local database=myApp + local collection=test + local port=27019 + local tls=false + [[ false == true ]] + mongos_command=run_mongos + log 'running db.test.command() in myApp' + set +o xtrace [2026-04-14T11:17:42+0000] running db.test.command() in myApp + run_mongos 'use myApp\n db.test.find()' @some-name-mongos.disabled-auth-30730 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3ljRoXaAVj +++ mktemp ++ local LAST_ERR=/tmp/tmp.dtE8ASl4jD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3ljRoXaAVj ++ cat /tmp/tmp.dtE8ASl4jD ++ rm /tmp/tmp.3ljRoXaAVj /tmp/tmp.dtE8ASl4jD ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.VbtJN46xaZ ++ mktemp + local LAST_ERR=/tmp/tmp.E2LUcGmKuW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VbtJN46xaZ + cat /tmp/tmp.E2LUcGmKuW + rm /tmp/tmp.VbtJN46xaZ /tmp/tmp.E2LUcGmKuW + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/compare/find-after-restore.json /tmp/tmp.yuUMqVy3ER/find-after-restore + desc 'enable authentication' + set +o xtrace ----------------------------------------------------------------------------------- enable authentication ----------------------------------------------------------------------------------- + pause_cluster some-name + local cluster_name=some-name + echo 'Pausing cluster some-name' Pausing cluster some-name + kubectl_bin patch psmdb some-name --type merge '-p={"spec": { "pause": true } }' ++ mktemp + local LAST_OUT=/tmp/tmp.aY7Ut3HLHo ++ mktemp + local LAST_ERR=/tmp/tmp.b2ASmz0phw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl patch psmdb some-name --type merge '-p={"spec": { "pause": true } }' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aY7Ut3HLHo perconaservermongodb.psmdb.percona.com/some-name patched + cat /tmp/tmp.b2ASmz0phw + rm /tmp/tmp.aY7Ut3HLHo /tmp/tmp.b2ASmz0phw + return 0 + wait_for_cluster_state some-name paused + local cluster_name=some-name + local target_state=paused + echo -n 'Waiting for psmdb/some-name to reach paused state' Waiting for psmdb/some-name to reach paused state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XEHjPWMD3t +++ mktemp ++ local LAST_ERR=/tmp/tmp.busJXJR6XA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XEHjPWMD3t ++ cat /tmp/tmp.busJXJR6XA ++ rm /tmp/tmp.XEHjPWMD3t /tmp/tmp.busJXJR6XA ++ return 0 + [[ ready =~ paused ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oOrKeG7tBb +++ mktemp ++ local LAST_ERR=/tmp/tmp.nsJ5MhERs1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oOrKeG7tBb ++ cat /tmp/tmp.nsJ5MhERs1 ++ rm /tmp/tmp.oOrKeG7tBb /tmp/tmp.nsJ5MhERs1 ++ return 0 + [[ ready =~ paused ]] + sleep 1 + timeout=2 + echo -n . .+ [[ 2 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d3U5xPjdBj +++ mktemp ++ local LAST_ERR=/tmp/tmp.EaYemydddj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.d3U5xPjdBj ++ cat /tmp/tmp.EaYemydddj ++ rm /tmp/tmp.d3U5xPjdBj /tmp/tmp.EaYemydddj ++ return 0 + [[ ready =~ paused ]] + sleep 1 + timeout=3 + echo -n . .+ [[ 3 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h9EJGKYibC +++ mktemp ++ local LAST_ERR=/tmp/tmp.uHvJJlrxEd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.h9EJGKYibC ++ cat /tmp/tmp.uHvJJlrxEd ++ rm /tmp/tmp.h9EJGKYibC /tmp/tmp.uHvJJlrxEd ++ return 0 + [[ ready =~ paused ]] + sleep 1 + timeout=4 + echo -n . .+ [[ 4 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UptuZyill3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.B7Ip3CdHIt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UptuZyill3 ++ cat /tmp/tmp.B7Ip3CdHIt ++ rm /tmp/tmp.UptuZyill3 /tmp/tmp.B7Ip3CdHIt ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=5 + echo -n . .+ [[ 5 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.82jcDrY61f +++ mktemp ++ local LAST_ERR=/tmp/tmp.bk3OKMaDGf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.82jcDrY61f ++ cat /tmp/tmp.bk3OKMaDGf ++ rm /tmp/tmp.82jcDrY61f /tmp/tmp.bk3OKMaDGf ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=6 + echo -n . .+ [[ 6 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wN0nFZ5jzi +++ mktemp ++ local LAST_ERR=/tmp/tmp.5fgrxXYG90 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wN0nFZ5jzi ++ cat /tmp/tmp.5fgrxXYG90 ++ rm /tmp/tmp.wN0nFZ5jzi /tmp/tmp.5fgrxXYG90 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=7 + echo -n . .+ [[ 7 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sG7pdLT75x +++ mktemp ++ local LAST_ERR=/tmp/tmp.evGb9Nk92f ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sG7pdLT75x ++ cat /tmp/tmp.evGb9Nk92f ++ rm /tmp/tmp.sG7pdLT75x /tmp/tmp.evGb9Nk92f ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=8 + echo -n . .+ [[ 8 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qjCa4cAJu4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Z6IU2F9Rag ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qjCa4cAJu4 ++ cat /tmp/tmp.Z6IU2F9Rag ++ rm /tmp/tmp.qjCa4cAJu4 /tmp/tmp.Z6IU2F9Rag ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=9 + echo -n . .+ [[ 9 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZLj87ibDlC +++ mktemp ++ local LAST_ERR=/tmp/tmp.fxvKhK2nEm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZLj87ibDlC ++ cat /tmp/tmp.fxvKhK2nEm ++ rm /tmp/tmp.ZLj87ibDlC /tmp/tmp.fxvKhK2nEm ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=10 + echo -n . .+ [[ 10 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GsvvCnPfcN +++ mktemp ++ local LAST_ERR=/tmp/tmp.F3AEjAWsXB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GsvvCnPfcN ++ cat /tmp/tmp.F3AEjAWsXB ++ rm /tmp/tmp.GsvvCnPfcN /tmp/tmp.F3AEjAWsXB ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=11 + echo -n . .+ [[ 11 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HnCDvgooxE +++ mktemp ++ local LAST_ERR=/tmp/tmp.NHwbmM7miN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HnCDvgooxE ++ cat /tmp/tmp.NHwbmM7miN ++ rm /tmp/tmp.HnCDvgooxE /tmp/tmp.NHwbmM7miN ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=12 + echo -n . .+ [[ 12 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uVrSfqunT9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Wpj1d45YIo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uVrSfqunT9 ++ cat /tmp/tmp.Wpj1d45YIo ++ rm /tmp/tmp.uVrSfqunT9 /tmp/tmp.Wpj1d45YIo ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=13 + echo -n . .+ [[ 13 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ohW8OMElty +++ mktemp ++ local LAST_ERR=/tmp/tmp.DP30xDCuKL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ohW8OMElty ++ cat /tmp/tmp.DP30xDCuKL ++ rm /tmp/tmp.ohW8OMElty /tmp/tmp.DP30xDCuKL ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=14 + echo -n . .+ [[ 14 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.K5efyFvJPO +++ mktemp ++ local LAST_ERR=/tmp/tmp.B5bJPl7YYZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.K5efyFvJPO ++ cat /tmp/tmp.B5bJPl7YYZ ++ rm /tmp/tmp.K5efyFvJPO /tmp/tmp.B5bJPl7YYZ ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=15 + echo -n . .+ [[ 15 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PnEokfKahY +++ mktemp ++ local LAST_ERR=/tmp/tmp.AtkBZQtNAI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PnEokfKahY ++ cat /tmp/tmp.AtkBZQtNAI ++ rm /tmp/tmp.PnEokfKahY /tmp/tmp.AtkBZQtNAI ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=16 + echo -n . .+ [[ 16 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ocFY3hCLhd +++ mktemp ++ local LAST_ERR=/tmp/tmp.QSpSRMMQHd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ocFY3hCLhd ++ cat /tmp/tmp.QSpSRMMQHd ++ rm /tmp/tmp.ocFY3hCLhd /tmp/tmp.QSpSRMMQHd ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=17 + echo -n . .+ [[ 17 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tfvHiAX6uW +++ mktemp ++ local LAST_ERR=/tmp/tmp.NFVF707qzx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tfvHiAX6uW ++ cat /tmp/tmp.NFVF707qzx ++ rm /tmp/tmp.tfvHiAX6uW /tmp/tmp.NFVF707qzx ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=18 + echo -n . .+ [[ 18 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.98ONpRkBoi +++ mktemp ++ local LAST_ERR=/tmp/tmp.uq9olFUNoY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.98ONpRkBoi ++ cat /tmp/tmp.uq9olFUNoY ++ rm /tmp/tmp.98ONpRkBoi /tmp/tmp.uq9olFUNoY ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=19 + echo -n . .+ [[ 19 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LCtV9Mpdrn +++ mktemp ++ local LAST_ERR=/tmp/tmp.BooL4lGv5z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LCtV9Mpdrn ++ cat /tmp/tmp.BooL4lGv5z ++ rm /tmp/tmp.LCtV9Mpdrn /tmp/tmp.BooL4lGv5z ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=20 + echo -n . .+ [[ 20 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b6On0vOcps +++ mktemp ++ local LAST_ERR=/tmp/tmp.1qZdhmiftc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b6On0vOcps ++ cat /tmp/tmp.1qZdhmiftc ++ rm /tmp/tmp.b6On0vOcps /tmp/tmp.1qZdhmiftc ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=21 + echo -n . .+ [[ 21 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rQHJYYYM04 +++ mktemp ++ local LAST_ERR=/tmp/tmp.AgE9IMX9F4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rQHJYYYM04 ++ cat /tmp/tmp.AgE9IMX9F4 ++ rm /tmp/tmp.rQHJYYYM04 /tmp/tmp.AgE9IMX9F4 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=22 + echo -n . .+ [[ 22 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nopz3u9emo +++ mktemp ++ local LAST_ERR=/tmp/tmp.sUxpKcxhCn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nopz3u9emo ++ cat /tmp/tmp.sUxpKcxhCn ++ rm /tmp/tmp.nopz3u9emo /tmp/tmp.sUxpKcxhCn ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=23 + echo -n . .+ [[ 23 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wHihbvmw0A +++ mktemp ++ local LAST_ERR=/tmp/tmp.gdtdNka19a ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wHihbvmw0A ++ cat /tmp/tmp.gdtdNka19a ++ rm /tmp/tmp.wHihbvmw0A /tmp/tmp.gdtdNka19a ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=24 + echo -n . .+ [[ 24 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JUqDgVj8VZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.sBGX5Ew3YS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JUqDgVj8VZ ++ cat /tmp/tmp.sBGX5Ew3YS ++ rm /tmp/tmp.JUqDgVj8VZ /tmp/tmp.sBGX5Ew3YS ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=25 + echo -n . .+ [[ 25 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Qsj1v1PH9t +++ mktemp ++ local LAST_ERR=/tmp/tmp.6iUGM8igHf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Qsj1v1PH9t ++ cat /tmp/tmp.6iUGM8igHf ++ rm /tmp/tmp.Qsj1v1PH9t /tmp/tmp.6iUGM8igHf ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=26 + echo -n . .+ [[ 26 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ue0K5N7BZu +++ mktemp ++ local LAST_ERR=/tmp/tmp.3A6RaQuOW2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ue0K5N7BZu ++ cat /tmp/tmp.3A6RaQuOW2 ++ rm /tmp/tmp.Ue0K5N7BZu /tmp/tmp.3A6RaQuOW2 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=27 + echo -n . .+ [[ 27 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iQ1FtGA5b4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.UQpSSw0i30 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iQ1FtGA5b4 ++ cat /tmp/tmp.UQpSSw0i30 ++ rm /tmp/tmp.iQ1FtGA5b4 /tmp/tmp.UQpSSw0i30 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=28 + echo -n . .+ [[ 28 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aDpXeRiVZ8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.iTBDvUXSYc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aDpXeRiVZ8 ++ cat /tmp/tmp.iTBDvUXSYc ++ rm /tmp/tmp.aDpXeRiVZ8 /tmp/tmp.iTBDvUXSYc ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=29 + echo -n . .+ [[ 29 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TWDjo77ec0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Td4FpGMGx7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TWDjo77ec0 ++ cat /tmp/tmp.Td4FpGMGx7 ++ rm /tmp/tmp.TWDjo77ec0 /tmp/tmp.Td4FpGMGx7 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=30 + echo -n . .+ [[ 30 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3eYYeyYliv +++ mktemp ++ local LAST_ERR=/tmp/tmp.X3nzLJh4DE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3eYYeyYliv ++ cat /tmp/tmp.X3nzLJh4DE ++ rm /tmp/tmp.3eYYeyYliv /tmp/tmp.X3nzLJh4DE ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=31 + echo -n . .+ [[ 31 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pSwRo7nY6G +++ mktemp ++ local LAST_ERR=/tmp/tmp.Fms977QBjk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pSwRo7nY6G ++ cat /tmp/tmp.Fms977QBjk ++ rm /tmp/tmp.pSwRo7nY6G /tmp/tmp.Fms977QBjk ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=32 + echo -n . .+ [[ 32 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2KT8yg0T8h +++ mktemp ++ local LAST_ERR=/tmp/tmp.Fzg3P8U508 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2KT8yg0T8h ++ cat /tmp/tmp.Fzg3P8U508 ++ rm /tmp/tmp.2KT8yg0T8h /tmp/tmp.Fzg3P8U508 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=33 + echo -n . .+ [[ 33 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IRoSnZjv0z +++ mktemp ++ local LAST_ERR=/tmp/tmp.3MyKdbdHg6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IRoSnZjv0z ++ cat /tmp/tmp.3MyKdbdHg6 ++ rm /tmp/tmp.IRoSnZjv0z /tmp/tmp.3MyKdbdHg6 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=34 + echo -n . .+ [[ 34 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TRxFNfEnB8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.DxneAY5hHM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TRxFNfEnB8 ++ cat /tmp/tmp.DxneAY5hHM ++ rm /tmp/tmp.TRxFNfEnB8 /tmp/tmp.DxneAY5hHM ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=35 + echo -n . .+ [[ 35 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9EHsBwvtXd +++ mktemp ++ local LAST_ERR=/tmp/tmp.0EcgJ8778s ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9EHsBwvtXd ++ cat /tmp/tmp.0EcgJ8778s ++ rm /tmp/tmp.9EHsBwvtXd /tmp/tmp.0EcgJ8778s ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=36 + echo -n . .+ [[ 36 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oh3lCGLNIA +++ mktemp ++ local LAST_ERR=/tmp/tmp.ikTaBuGRKn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oh3lCGLNIA ++ cat /tmp/tmp.ikTaBuGRKn ++ rm /tmp/tmp.oh3lCGLNIA /tmp/tmp.ikTaBuGRKn ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=37 + echo -n . .+ [[ 37 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tfYPrsemv2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.wg5cirOPtE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tfYPrsemv2 ++ cat /tmp/tmp.wg5cirOPtE ++ rm /tmp/tmp.tfYPrsemv2 /tmp/tmp.wg5cirOPtE ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=38 + echo -n . .+ [[ 38 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.74qbuFUaJ3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.z2wNT7iLg1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.74qbuFUaJ3 ++ cat /tmp/tmp.z2wNT7iLg1 ++ rm /tmp/tmp.74qbuFUaJ3 /tmp/tmp.z2wNT7iLg1 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=39 + echo -n . .+ [[ 39 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Kx9EyQ73oK +++ mktemp ++ local LAST_ERR=/tmp/tmp.x9PZ0qAYKX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Kx9EyQ73oK ++ cat /tmp/tmp.x9PZ0qAYKX ++ rm /tmp/tmp.Kx9EyQ73oK /tmp/tmp.x9PZ0qAYKX ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=40 + echo -n . .+ [[ 40 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1KrVlmv22G +++ mktemp ++ local LAST_ERR=/tmp/tmp.few4cMb60Q ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1KrVlmv22G ++ cat /tmp/tmp.few4cMb60Q ++ rm /tmp/tmp.1KrVlmv22G /tmp/tmp.few4cMb60Q ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=41 + echo -n . .+ [[ 41 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h0qDljjY9M +++ mktemp ++ local LAST_ERR=/tmp/tmp.YoqwFbJULz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.h0qDljjY9M ++ cat /tmp/tmp.YoqwFbJULz ++ rm /tmp/tmp.h0qDljjY9M /tmp/tmp.YoqwFbJULz ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=42 + echo -n . .+ [[ 42 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sOm1Qzt0Ns +++ mktemp ++ local LAST_ERR=/tmp/tmp.U2eBMv9itE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sOm1Qzt0Ns ++ cat /tmp/tmp.U2eBMv9itE ++ rm /tmp/tmp.sOm1Qzt0Ns /tmp/tmp.U2eBMv9itE ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=43 + echo -n . .+ [[ 43 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yVtzwSrj21 +++ mktemp ++ local LAST_ERR=/tmp/tmp.eWvLr3WxCW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yVtzwSrj21 ++ cat /tmp/tmp.eWvLr3WxCW ++ rm /tmp/tmp.yVtzwSrj21 /tmp/tmp.eWvLr3WxCW ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=44 + echo -n . .+ [[ 44 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lu3mYpF3I6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.eTa8XiufQ2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lu3mYpF3I6 ++ cat /tmp/tmp.eTa8XiufQ2 ++ rm /tmp/tmp.lu3mYpF3I6 /tmp/tmp.eTa8XiufQ2 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=45 + echo -n . .+ [[ 45 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xTwx4CRQs9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.UdPret1TJA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xTwx4CRQs9 ++ cat /tmp/tmp.UdPret1TJA ++ rm /tmp/tmp.xTwx4CRQs9 /tmp/tmp.UdPret1TJA ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=46 + echo -n . .+ [[ 46 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UMXba0Kzqi +++ mktemp ++ local LAST_ERR=/tmp/tmp.TFqMdWjWke ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UMXba0Kzqi ++ cat /tmp/tmp.TFqMdWjWke ++ rm /tmp/tmp.UMXba0Kzqi /tmp/tmp.TFqMdWjWke ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=47 + echo -n . .+ [[ 47 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BXSihHsI1m +++ mktemp ++ local LAST_ERR=/tmp/tmp.47sMTUSxf2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BXSihHsI1m ++ cat /tmp/tmp.47sMTUSxf2 ++ rm /tmp/tmp.BXSihHsI1m /tmp/tmp.47sMTUSxf2 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=48 + echo -n . .+ [[ 48 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3cgnuOGf8l +++ mktemp ++ local LAST_ERR=/tmp/tmp.dp8hBmcnBr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3cgnuOGf8l ++ cat /tmp/tmp.dp8hBmcnBr ++ rm /tmp/tmp.3cgnuOGf8l /tmp/tmp.dp8hBmcnBr ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=49 + echo -n . .+ [[ 49 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qwnaymBaU2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.YBf6gyRZQi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qwnaymBaU2 ++ cat /tmp/tmp.YBf6gyRZQi ++ rm /tmp/tmp.qwnaymBaU2 /tmp/tmp.YBf6gyRZQi ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=50 + echo -n . .+ [[ 50 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.j7fb6UBiD6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3loH28ryJ4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.j7fb6UBiD6 ++ cat /tmp/tmp.3loH28ryJ4 ++ rm /tmp/tmp.j7fb6UBiD6 /tmp/tmp.3loH28ryJ4 ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=51 + echo -n . .+ [[ 51 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SmRbn889GE +++ mktemp ++ local LAST_ERR=/tmp/tmp.QtbH33JqSP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SmRbn889GE ++ cat /tmp/tmp.QtbH33JqSP ++ rm /tmp/tmp.SmRbn889GE /tmp/tmp.QtbH33JqSP ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=52 + echo -n . .+ [[ 52 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HHGM44FaVr +++ mktemp ++ local LAST_ERR=/tmp/tmp.u1taOls9QW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HHGM44FaVr ++ cat /tmp/tmp.u1taOls9QW ++ rm /tmp/tmp.HHGM44FaVr /tmp/tmp.u1taOls9QW ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=53 + echo -n . .+ [[ 53 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1yN1vmU8nv +++ mktemp ++ local LAST_ERR=/tmp/tmp.RAHamowrer ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1yN1vmU8nv ++ cat /tmp/tmp.RAHamowrer ++ rm /tmp/tmp.1yN1vmU8nv /tmp/tmp.RAHamowrer ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=54 + echo -n . .+ [[ 54 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2dEwOYicGa +++ mktemp ++ local LAST_ERR=/tmp/tmp.6DbSG1r28V ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2dEwOYicGa ++ cat /tmp/tmp.6DbSG1r28V ++ rm /tmp/tmp.2dEwOYicGa /tmp/tmp.6DbSG1r28V ++ return 0 + [[ stopping =~ paused ]] + sleep 1 + timeout=55 + echo -n . .+ [[ 55 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LH5cmqqNHX +++ mktemp ++ local LAST_ERR=/tmp/tmp.XqlpxYej18 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LH5cmqqNHX ++ cat /tmp/tmp.XqlpxYej18 ++ rm /tmp/tmp.LH5cmqqNHX /tmp/tmp.XqlpxYej18 ++ return 0 + [[ paused =~ paused ]] + echo + log 'psmdb/some-name is paused: OK' + set +o xtrace [2026-04-14T11:19:42+0000] psmdb/some-name is paused: OK + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-with-auth.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-with-auth.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/cluster-with-auth.yml + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2256-98b7d85f"' ++ mktemp + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + yq eval '.spec.upgradeOptions.apply="Never"' + local LAST_OUT=/tmp/tmp.WzlrcDQyG5 + /usr/sbin/sed -e s/NAME_SPACE/disabled-auth-30730/g ++ mktemp + local LAST_ERR=/tmp/tmp.omGGqcim8n + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WzlrcDQyG5 perconaservermongodb.psmdb.percona.com/some-name configured + cat /tmp/tmp.omGGqcim8n + rm /tmp/tmp.WzlrcDQyG5 /tmp/tmp.omGGqcim8n + return 0 + unpause_cluster some-name + local cluster_name=some-name + echo 'Unpausing cluster some-name' Unpausing cluster some-name + kubectl_bin patch psmdb some-name --type merge '-p={"spec": { "pause": false } }' ++ mktemp + local LAST_OUT=/tmp/tmp.0QpR0uv2su ++ mktemp + local LAST_ERR=/tmp/tmp.pdQ1sx2YAm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl patch psmdb some-name --type merge '-p={"spec": { "pause": false } }' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0QpR0uv2su perconaservermongodb.psmdb.percona.com/some-name patched + cat /tmp/tmp.pdQ1sx2YAm + rm /tmp/tmp.0QpR0uv2su /tmp/tmp.pdQ1sx2YAm + return 0 + wait_for_cluster_state some-name ready + local cluster_name=some-name + local target_state=ready + echo -n 'Waiting for psmdb/some-name to reach ready state' Waiting for psmdb/some-name to reach ready state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Y61zG5S98e +++ mktemp ++ local LAST_ERR=/tmp/tmp.NIgQzetF7V ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Y61zG5S98e ++ cat /tmp/tmp.NIgQzetF7V ++ rm /tmp/tmp.Y61zG5S98e /tmp/tmp.NIgQzetF7V ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.U9xxC9YFwr +++ mktemp ++ local LAST_ERR=/tmp/tmp.6dvsv0OgMD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.U9xxC9YFwr ++ cat /tmp/tmp.6dvsv0OgMD ++ rm /tmp/tmp.U9xxC9YFwr /tmp/tmp.6dvsv0OgMD ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=2 + echo -n . .+ [[ 2 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8ye4CSAhKm +++ mktemp ++ local LAST_ERR=/tmp/tmp.wEB5jgz6Ak ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8ye4CSAhKm ++ cat /tmp/tmp.wEB5jgz6Ak ++ rm /tmp/tmp.8ye4CSAhKm /tmp/tmp.wEB5jgz6Ak ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=3 + echo -n . .+ [[ 3 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yUvuIySeOp +++ mktemp ++ local LAST_ERR=/tmp/tmp.AjTxwkaTta ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yUvuIySeOp ++ cat /tmp/tmp.AjTxwkaTta ++ rm /tmp/tmp.yUvuIySeOp /tmp/tmp.AjTxwkaTta ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=4 + echo -n . .+ [[ 4 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vZYLbjZITv +++ mktemp ++ local LAST_ERR=/tmp/tmp.5cYfJBObNf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vZYLbjZITv ++ cat /tmp/tmp.5cYfJBObNf ++ rm /tmp/tmp.vZYLbjZITv /tmp/tmp.5cYfJBObNf ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=5 + echo -n . .+ [[ 5 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fuvmW9PWb3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WG4gzxJwtP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fuvmW9PWb3 ++ cat /tmp/tmp.WG4gzxJwtP ++ rm /tmp/tmp.fuvmW9PWb3 /tmp/tmp.WG4gzxJwtP ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=6 + echo -n . .+ [[ 6 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TVO3ISJliN +++ mktemp ++ local LAST_ERR=/tmp/tmp.wJAixjIcZP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TVO3ISJliN ++ cat /tmp/tmp.wJAixjIcZP ++ rm /tmp/tmp.TVO3ISJliN /tmp/tmp.wJAixjIcZP ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=7 + echo -n . .+ [[ 7 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bZIyKEoYzy +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZB0MOxS7XU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bZIyKEoYzy ++ cat /tmp/tmp.ZB0MOxS7XU ++ rm /tmp/tmp.bZIyKEoYzy /tmp/tmp.ZB0MOxS7XU ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=8 + echo -n . .+ [[ 8 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1sMOc6TbB3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.d6QdD6IRFz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1sMOc6TbB3 ++ cat /tmp/tmp.d6QdD6IRFz ++ rm /tmp/tmp.1sMOc6TbB3 /tmp/tmp.d6QdD6IRFz ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=9 + echo -n . .+ [[ 9 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.W6rDY4CVw5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.YDCAJGzXOW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.W6rDY4CVw5 ++ cat /tmp/tmp.YDCAJGzXOW ++ rm /tmp/tmp.W6rDY4CVw5 /tmp/tmp.YDCAJGzXOW ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=10 + echo -n . .+ [[ 10 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UBLhWTC7IO +++ mktemp ++ local LAST_ERR=/tmp/tmp.9zzasg3jmJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UBLhWTC7IO ++ cat /tmp/tmp.9zzasg3jmJ ++ rm /tmp/tmp.UBLhWTC7IO /tmp/tmp.9zzasg3jmJ ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=11 + echo -n . .+ [[ 11 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UrkZbKrD8e +++ mktemp ++ local LAST_ERR=/tmp/tmp.pl4Zn7D86F ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UrkZbKrD8e ++ cat /tmp/tmp.pl4Zn7D86F ++ rm /tmp/tmp.UrkZbKrD8e /tmp/tmp.pl4Zn7D86F ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=12 + echo -n . .+ [[ 12 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gBBRgOHUtW +++ mktemp ++ local LAST_ERR=/tmp/tmp.5CWflz8Wkw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gBBRgOHUtW ++ cat /tmp/tmp.5CWflz8Wkw ++ rm /tmp/tmp.gBBRgOHUtW /tmp/tmp.5CWflz8Wkw ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=13 + echo -n . .+ [[ 13 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.B3hYWUCX7C +++ mktemp ++ local LAST_ERR=/tmp/tmp.mdAqRASNJ9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.B3hYWUCX7C ++ cat /tmp/tmp.mdAqRASNJ9 ++ rm /tmp/tmp.B3hYWUCX7C /tmp/tmp.mdAqRASNJ9 ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=14 + echo -n . .+ [[ 14 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HZHC0bev3A +++ mktemp ++ local LAST_ERR=/tmp/tmp.c9sPc60OhG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HZHC0bev3A ++ cat /tmp/tmp.c9sPc60OhG ++ rm /tmp/tmp.HZHC0bev3A /tmp/tmp.c9sPc60OhG ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=15 + echo -n . .+ [[ 15 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D8UDJmmqJ1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.KczM7ucA2C ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D8UDJmmqJ1 ++ cat /tmp/tmp.KczM7ucA2C ++ rm /tmp/tmp.D8UDJmmqJ1 /tmp/tmp.KczM7ucA2C ++ return 0 + [[ paused =~ ready ]] + sleep 1 + timeout=16 + echo -n . .+ [[ 16 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zd6ktmi4hQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.0P4VqIimRg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zd6ktmi4hQ ++ cat /tmp/tmp.0P4VqIimRg ++ rm /tmp/tmp.zd6ktmi4hQ /tmp/tmp.0P4VqIimRg ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=17 + echo -n . .+ [[ 17 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zf6DIK9JMj +++ mktemp ++ local LAST_ERR=/tmp/tmp.97DTt7ya5r ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zf6DIK9JMj ++ cat /tmp/tmp.97DTt7ya5r ++ rm /tmp/tmp.zf6DIK9JMj /tmp/tmp.97DTt7ya5r ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=18 + echo -n . .+ [[ 18 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KDB0cOWpZx +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q2DJk039EI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KDB0cOWpZx ++ cat /tmp/tmp.Q2DJk039EI ++ rm /tmp/tmp.KDB0cOWpZx /tmp/tmp.Q2DJk039EI ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=19 + echo -n . .+ [[ 19 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hg4lUV62kC +++ mktemp ++ local LAST_ERR=/tmp/tmp.tnQibIY55x ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hg4lUV62kC ++ cat /tmp/tmp.tnQibIY55x ++ rm /tmp/tmp.hg4lUV62kC /tmp/tmp.tnQibIY55x ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=20 + echo -n . .+ [[ 20 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dyfqcFfaU6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.6uVnpKK6CT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dyfqcFfaU6 ++ cat /tmp/tmp.6uVnpKK6CT ++ rm /tmp/tmp.dyfqcFfaU6 /tmp/tmp.6uVnpKK6CT ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=21 + echo -n . .+ [[ 21 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WC8dbAcby2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.wObYlvjbxm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WC8dbAcby2 ++ cat /tmp/tmp.wObYlvjbxm ++ rm /tmp/tmp.WC8dbAcby2 /tmp/tmp.wObYlvjbxm ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=22 + echo -n . .+ [[ 22 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.auRABXu88b +++ mktemp ++ local LAST_ERR=/tmp/tmp.fBx9RnaqCM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.auRABXu88b ++ cat /tmp/tmp.fBx9RnaqCM ++ rm /tmp/tmp.auRABXu88b /tmp/tmp.fBx9RnaqCM ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=23 + echo -n . .+ [[ 23 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SfyjpuGOl9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ERiXNyeQ1m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SfyjpuGOl9 ++ cat /tmp/tmp.ERiXNyeQ1m ++ rm /tmp/tmp.SfyjpuGOl9 /tmp/tmp.ERiXNyeQ1m ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=24 + echo -n . .+ [[ 24 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sO2b1FkulE +++ mktemp ++ local LAST_ERR=/tmp/tmp.Jau1CRZlrp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sO2b1FkulE ++ cat /tmp/tmp.Jau1CRZlrp ++ rm /tmp/tmp.sO2b1FkulE /tmp/tmp.Jau1CRZlrp ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=25 + echo -n . .+ [[ 25 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Q21fCunIBP +++ mktemp ++ local LAST_ERR=/tmp/tmp.rw9ef1npVB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Q21fCunIBP ++ cat /tmp/tmp.rw9ef1npVB ++ rm /tmp/tmp.Q21fCunIBP /tmp/tmp.rw9ef1npVB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=26 + echo -n . .+ [[ 26 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.82ctazdsGU +++ mktemp ++ local LAST_ERR=/tmp/tmp.ASE18ayu68 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.82ctazdsGU ++ cat /tmp/tmp.ASE18ayu68 ++ rm /tmp/tmp.82ctazdsGU /tmp/tmp.ASE18ayu68 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=27 + echo -n . .+ [[ 27 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zgzkhaHNL4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.f0Ib0DsvDO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zgzkhaHNL4 ++ cat /tmp/tmp.f0Ib0DsvDO ++ rm /tmp/tmp.zgzkhaHNL4 /tmp/tmp.f0Ib0DsvDO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=28 + echo -n . .+ [[ 28 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OAn7BVg3jy +++ mktemp ++ local LAST_ERR=/tmp/tmp.EE7hgo7hYo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OAn7BVg3jy ++ cat /tmp/tmp.EE7hgo7hYo ++ rm /tmp/tmp.OAn7BVg3jy /tmp/tmp.EE7hgo7hYo ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=29 + echo -n . .+ [[ 29 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Rsnfl1oVWh +++ mktemp ++ local LAST_ERR=/tmp/tmp.Lo6wU94RBK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Rsnfl1oVWh ++ cat /tmp/tmp.Lo6wU94RBK ++ rm /tmp/tmp.Rsnfl1oVWh /tmp/tmp.Lo6wU94RBK ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=30 + echo -n . .+ [[ 30 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.00CaDAquY9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ckSFjWYwLT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.00CaDAquY9 ++ cat /tmp/tmp.ckSFjWYwLT ++ rm /tmp/tmp.00CaDAquY9 /tmp/tmp.ckSFjWYwLT ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=31 + echo -n . .+ [[ 31 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HA93kQPmfn +++ mktemp ++ local LAST_ERR=/tmp/tmp.B1671nwMQD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HA93kQPmfn ++ cat /tmp/tmp.B1671nwMQD ++ rm /tmp/tmp.HA93kQPmfn /tmp/tmp.B1671nwMQD ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=32 + echo -n . .+ [[ 32 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0iSkcThfJf +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZUcR5k9tZB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0iSkcThfJf ++ cat /tmp/tmp.ZUcR5k9tZB ++ rm /tmp/tmp.0iSkcThfJf /tmp/tmp.ZUcR5k9tZB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=33 + echo -n . .+ [[ 33 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.T5Z659rJR5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.fAe2xVlD0c ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.T5Z659rJR5 ++ cat /tmp/tmp.fAe2xVlD0c ++ rm /tmp/tmp.T5Z659rJR5 /tmp/tmp.fAe2xVlD0c ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=34 + echo -n . .+ [[ 34 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OrTSX6bvaF +++ mktemp ++ local LAST_ERR=/tmp/tmp.dFKjXHacwf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OrTSX6bvaF ++ cat /tmp/tmp.dFKjXHacwf ++ rm /tmp/tmp.OrTSX6bvaF /tmp/tmp.dFKjXHacwf ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=35 + echo -n . .+ [[ 35 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.O43UM8n6xP +++ mktemp ++ local LAST_ERR=/tmp/tmp.lUTiIFIWxN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.O43UM8n6xP ++ cat /tmp/tmp.lUTiIFIWxN ++ rm /tmp/tmp.O43UM8n6xP /tmp/tmp.lUTiIFIWxN ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=36 + echo -n . .+ [[ 36 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4dstZt7LJw +++ mktemp ++ local LAST_ERR=/tmp/tmp.dlXrehNEFN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4dstZt7LJw ++ cat /tmp/tmp.dlXrehNEFN ++ rm /tmp/tmp.4dstZt7LJw /tmp/tmp.dlXrehNEFN ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=37 + echo -n . .+ [[ 37 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aPY8H2DGku +++ mktemp ++ local LAST_ERR=/tmp/tmp.lYlUXepbou ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aPY8H2DGku ++ cat /tmp/tmp.lYlUXepbou ++ rm /tmp/tmp.aPY8H2DGku /tmp/tmp.lYlUXepbou ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=38 + echo -n . .+ [[ 38 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.W3BYfpMGPN +++ mktemp ++ local LAST_ERR=/tmp/tmp.ASxxBnjA4x ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.W3BYfpMGPN ++ cat /tmp/tmp.ASxxBnjA4x ++ rm /tmp/tmp.W3BYfpMGPN /tmp/tmp.ASxxBnjA4x ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=39 + echo -n . .+ [[ 39 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6Io9HeeIlS +++ mktemp ++ local LAST_ERR=/tmp/tmp.qX2as5UFO6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6Io9HeeIlS ++ cat /tmp/tmp.qX2as5UFO6 ++ rm /tmp/tmp.6Io9HeeIlS /tmp/tmp.qX2as5UFO6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=40 + echo -n . .+ [[ 40 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hzNzmpvKCK +++ mktemp ++ local LAST_ERR=/tmp/tmp.fjwxbsr0lM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hzNzmpvKCK ++ cat /tmp/tmp.fjwxbsr0lM ++ rm /tmp/tmp.hzNzmpvKCK /tmp/tmp.fjwxbsr0lM ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=41 + echo -n . .+ [[ 41 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XXb1TGhtkv +++ mktemp ++ local LAST_ERR=/tmp/tmp.f6x5F3nngt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XXb1TGhtkv ++ cat /tmp/tmp.f6x5F3nngt ++ rm /tmp/tmp.XXb1TGhtkv /tmp/tmp.f6x5F3nngt ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=42 + echo -n . .+ [[ 42 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Oa6U1D7tr8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.VnPOmqoSJI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Oa6U1D7tr8 ++ cat /tmp/tmp.VnPOmqoSJI ++ rm /tmp/tmp.Oa6U1D7tr8 /tmp/tmp.VnPOmqoSJI ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=43 + echo -n . .+ [[ 43 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gAL5ZbxVb5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9Ba0fRuv89 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gAL5ZbxVb5 ++ cat /tmp/tmp.9Ba0fRuv89 ++ rm /tmp/tmp.gAL5ZbxVb5 /tmp/tmp.9Ba0fRuv89 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=44 + echo -n . .+ [[ 44 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OQJrNT4wgf +++ mktemp ++ local LAST_ERR=/tmp/tmp.FPhA2QwTp0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OQJrNT4wgf ++ cat /tmp/tmp.FPhA2QwTp0 ++ rm /tmp/tmp.OQJrNT4wgf /tmp/tmp.FPhA2QwTp0 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=45 + echo -n . .+ [[ 45 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3oxcOeP6bl +++ mktemp ++ local LAST_ERR=/tmp/tmp.IcJtkMB2eW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3oxcOeP6bl ++ cat /tmp/tmp.IcJtkMB2eW ++ rm /tmp/tmp.3oxcOeP6bl /tmp/tmp.IcJtkMB2eW ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=46 + echo -n . .+ [[ 46 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4LayVfxnFH +++ mktemp ++ local LAST_ERR=/tmp/tmp.YRCTmcIN6O ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4LayVfxnFH ++ cat /tmp/tmp.YRCTmcIN6O ++ rm /tmp/tmp.4LayVfxnFH /tmp/tmp.YRCTmcIN6O ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=47 + echo -n . .+ [[ 47 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JGrA63AmxW +++ mktemp ++ local LAST_ERR=/tmp/tmp.CuaqPmRJsh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JGrA63AmxW ++ cat /tmp/tmp.CuaqPmRJsh ++ rm /tmp/tmp.JGrA63AmxW /tmp/tmp.CuaqPmRJsh ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=48 + echo -n . .+ [[ 48 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z4jTNqZzgD +++ mktemp ++ local LAST_ERR=/tmp/tmp.TgZKDMX7Xr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z4jTNqZzgD ++ cat /tmp/tmp.TgZKDMX7Xr ++ rm /tmp/tmp.Z4jTNqZzgD /tmp/tmp.TgZKDMX7Xr ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=49 + echo -n . .+ [[ 49 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.131xLD9CwF +++ mktemp ++ local LAST_ERR=/tmp/tmp.vqkKCAFZLn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.131xLD9CwF ++ cat /tmp/tmp.vqkKCAFZLn ++ rm /tmp/tmp.131xLD9CwF /tmp/tmp.vqkKCAFZLn ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=50 + echo -n . .+ [[ 50 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WuiJbe8W0e +++ mktemp ++ local LAST_ERR=/tmp/tmp.7bMRz1bKzQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WuiJbe8W0e ++ cat /tmp/tmp.7bMRz1bKzQ ++ rm /tmp/tmp.WuiJbe8W0e /tmp/tmp.7bMRz1bKzQ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=51 + echo -n . .+ [[ 51 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qBBVUziPJp +++ mktemp ++ local LAST_ERR=/tmp/tmp.cQEv8DtQAD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qBBVUziPJp ++ cat /tmp/tmp.cQEv8DtQAD ++ rm /tmp/tmp.qBBVUziPJp /tmp/tmp.cQEv8DtQAD ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=52 + echo -n . .+ [[ 52 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KJ1KqdJBl2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ALK8FZZ4zQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KJ1KqdJBl2 ++ cat /tmp/tmp.ALK8FZZ4zQ ++ rm /tmp/tmp.KJ1KqdJBl2 /tmp/tmp.ALK8FZZ4zQ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=53 + echo -n . .+ [[ 53 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.igsVr8ZFhX +++ mktemp ++ local LAST_ERR=/tmp/tmp.cAS4h93Qkt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.igsVr8ZFhX ++ cat /tmp/tmp.cAS4h93Qkt ++ rm /tmp/tmp.igsVr8ZFhX /tmp/tmp.cAS4h93Qkt ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=54 + echo -n . .+ [[ 54 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.g89MWjwlBO +++ mktemp ++ local LAST_ERR=/tmp/tmp.j5ztM8myW5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.g89MWjwlBO ++ cat /tmp/tmp.j5ztM8myW5 ++ rm /tmp/tmp.g89MWjwlBO /tmp/tmp.j5ztM8myW5 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=55 + echo -n . .+ [[ 55 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JXBPw7YdFs +++ mktemp ++ local LAST_ERR=/tmp/tmp.72QBvHSuDp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JXBPw7YdFs ++ cat /tmp/tmp.72QBvHSuDp ++ rm /tmp/tmp.JXBPw7YdFs /tmp/tmp.72QBvHSuDp ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=56 + echo -n . .+ [[ 56 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UKOsL62ZLf +++ mktemp ++ local LAST_ERR=/tmp/tmp.C6o10rmF1b ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UKOsL62ZLf ++ cat /tmp/tmp.C6o10rmF1b ++ rm /tmp/tmp.UKOsL62ZLf /tmp/tmp.C6o10rmF1b ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=57 + echo -n . .+ [[ 57 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GmwaMPb2PN +++ mktemp ++ local LAST_ERR=/tmp/tmp.JYr89YZV25 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GmwaMPb2PN ++ cat /tmp/tmp.JYr89YZV25 ++ rm /tmp/tmp.GmwaMPb2PN /tmp/tmp.JYr89YZV25 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=58 + echo -n . .+ [[ 58 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ae4HgiDz3O +++ mktemp ++ local LAST_ERR=/tmp/tmp.n2l8asMbGD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ae4HgiDz3O ++ cat /tmp/tmp.n2l8asMbGD ++ rm /tmp/tmp.Ae4HgiDz3O /tmp/tmp.n2l8asMbGD ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=59 + echo -n . .+ [[ 59 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.O5EoKGomqZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.uEwGNvoe7a ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.O5EoKGomqZ ++ cat /tmp/tmp.uEwGNvoe7a ++ rm /tmp/tmp.O5EoKGomqZ /tmp/tmp.uEwGNvoe7a ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=60 + echo -n . .+ [[ 60 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KYJpAxppvW +++ mktemp ++ local LAST_ERR=/tmp/tmp.AsALDgnmne ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KYJpAxppvW ++ cat /tmp/tmp.AsALDgnmne ++ rm /tmp/tmp.KYJpAxppvW /tmp/tmp.AsALDgnmne ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=61 + echo -n . .+ [[ 61 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hnjW7Xr5lC +++ mktemp ++ local LAST_ERR=/tmp/tmp.VTqSc7hWME ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hnjW7Xr5lC ++ cat /tmp/tmp.VTqSc7hWME ++ rm /tmp/tmp.hnjW7Xr5lC /tmp/tmp.VTqSc7hWME ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=62 + echo -n . .+ [[ 62 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1yFSO3rvh9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.n8CeeSXOFL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1yFSO3rvh9 ++ cat /tmp/tmp.n8CeeSXOFL ++ rm /tmp/tmp.1yFSO3rvh9 /tmp/tmp.n8CeeSXOFL ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=63 + echo -n . .+ [[ 63 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MJ83i8MVBV +++ mktemp ++ local LAST_ERR=/tmp/tmp.tZXLcun3PP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MJ83i8MVBV ++ cat /tmp/tmp.tZXLcun3PP ++ rm /tmp/tmp.MJ83i8MVBV /tmp/tmp.tZXLcun3PP ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=64 + echo -n . .+ [[ 64 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oUEwC7xzGB +++ mktemp ++ local LAST_ERR=/tmp/tmp.Vgpxd4b8Gx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oUEwC7xzGB ++ cat /tmp/tmp.Vgpxd4b8Gx ++ rm /tmp/tmp.oUEwC7xzGB /tmp/tmp.Vgpxd4b8Gx ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=65 + echo -n . .+ [[ 65 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.j1sPCvshUL +++ mktemp ++ local LAST_ERR=/tmp/tmp.LGcucxeps2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.j1sPCvshUL ++ cat /tmp/tmp.LGcucxeps2 ++ rm /tmp/tmp.j1sPCvshUL /tmp/tmp.LGcucxeps2 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=66 + echo -n . .+ [[ 66 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.THaAZr2f2x +++ mktemp ++ local LAST_ERR=/tmp/tmp.Z3VfOX5iwy ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.THaAZr2f2x ++ cat /tmp/tmp.Z3VfOX5iwy ++ rm /tmp/tmp.THaAZr2f2x /tmp/tmp.Z3VfOX5iwy ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=67 + echo -n . .+ [[ 67 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nrhXJKtgmv +++ mktemp ++ local LAST_ERR=/tmp/tmp.KTGUiUDiHH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nrhXJKtgmv ++ cat /tmp/tmp.KTGUiUDiHH ++ rm /tmp/tmp.nrhXJKtgmv /tmp/tmp.KTGUiUDiHH ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=68 + echo -n . .+ [[ 68 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0SlqN2XhKv +++ mktemp ++ local LAST_ERR=/tmp/tmp.pLsKwU445Y ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0SlqN2XhKv ++ cat /tmp/tmp.pLsKwU445Y ++ rm /tmp/tmp.0SlqN2XhKv /tmp/tmp.pLsKwU445Y ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=69 + echo -n . .+ [[ 69 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JdFwX5BxRV +++ mktemp ++ local LAST_ERR=/tmp/tmp.jGyRNsfklr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JdFwX5BxRV ++ cat /tmp/tmp.jGyRNsfklr ++ rm /tmp/tmp.JdFwX5BxRV /tmp/tmp.jGyRNsfklr ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=70 + echo -n . .+ [[ 70 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hfqXFEUn1i +++ mktemp ++ local LAST_ERR=/tmp/tmp.9h2ljFi5Md ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hfqXFEUn1i ++ cat /tmp/tmp.9h2ljFi5Md ++ rm /tmp/tmp.hfqXFEUn1i /tmp/tmp.9h2ljFi5Md ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=71 + echo -n . .+ [[ 71 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z8S2ieUYFJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.6yALUY1XW0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z8S2ieUYFJ ++ cat /tmp/tmp.6yALUY1XW0 ++ rm /tmp/tmp.Z8S2ieUYFJ /tmp/tmp.6yALUY1XW0 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=72 + echo -n . .+ [[ 72 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DzGHuoSP2P +++ mktemp ++ local LAST_ERR=/tmp/tmp.kuGnVzjTI4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DzGHuoSP2P ++ cat /tmp/tmp.kuGnVzjTI4 ++ rm /tmp/tmp.DzGHuoSP2P /tmp/tmp.kuGnVzjTI4 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=73 + echo -n . .+ [[ 73 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HYsxcn9330 +++ mktemp ++ local LAST_ERR=/tmp/tmp.D00X8YT2gS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HYsxcn9330 ++ cat /tmp/tmp.D00X8YT2gS ++ rm /tmp/tmp.HYsxcn9330 /tmp/tmp.D00X8YT2gS ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=74 + echo -n . .+ [[ 74 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.t9Pn5mmPdI +++ mktemp ++ local LAST_ERR=/tmp/tmp.oHx7VdCnYP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.t9Pn5mmPdI ++ cat /tmp/tmp.oHx7VdCnYP ++ rm /tmp/tmp.t9Pn5mmPdI /tmp/tmp.oHx7VdCnYP ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=75 + echo -n . .+ [[ 75 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dWfF738kY6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.4LExXuF7TN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dWfF738kY6 ++ cat /tmp/tmp.4LExXuF7TN ++ rm /tmp/tmp.dWfF738kY6 /tmp/tmp.4LExXuF7TN ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=76 + echo -n . .+ [[ 76 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ACLU3GFhsx +++ mktemp ++ local LAST_ERR=/tmp/tmp.adcJR8c2Gq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ACLU3GFhsx ++ cat /tmp/tmp.adcJR8c2Gq ++ rm /tmp/tmp.ACLU3GFhsx /tmp/tmp.adcJR8c2Gq ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=77 + echo -n . .+ [[ 77 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gW0mTcBF4l +++ mktemp ++ local LAST_ERR=/tmp/tmp.eezAohW2EL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gW0mTcBF4l ++ cat /tmp/tmp.eezAohW2EL ++ rm /tmp/tmp.gW0mTcBF4l /tmp/tmp.eezAohW2EL ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=78 + echo -n . .+ [[ 78 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wFKiaF9l8s +++ mktemp ++ local LAST_ERR=/tmp/tmp.d0UZj9f1AN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wFKiaF9l8s ++ cat /tmp/tmp.d0UZj9f1AN ++ rm /tmp/tmp.wFKiaF9l8s /tmp/tmp.d0UZj9f1AN ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=79 + echo -n . .+ [[ 79 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7hw5uRyWHb +++ mktemp ++ local LAST_ERR=/tmp/tmp.OATzEqzJDt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7hw5uRyWHb ++ cat /tmp/tmp.OATzEqzJDt ++ rm /tmp/tmp.7hw5uRyWHb /tmp/tmp.OATzEqzJDt ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=80 + echo -n . .+ [[ 80 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oPoUziZn38 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WXioYrN09H ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oPoUziZn38 ++ cat /tmp/tmp.WXioYrN09H ++ rm /tmp/tmp.oPoUziZn38 /tmp/tmp.WXioYrN09H ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=81 + echo -n . .+ [[ 81 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.grp5jVbbwC +++ mktemp ++ local LAST_ERR=/tmp/tmp.LxWMQlcvFt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.grp5jVbbwC ++ cat /tmp/tmp.LxWMQlcvFt ++ rm /tmp/tmp.grp5jVbbwC /tmp/tmp.LxWMQlcvFt ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=82 + echo -n . .+ [[ 82 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UAbCO44wQz +++ mktemp ++ local LAST_ERR=/tmp/tmp.inIl6k7Aw4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UAbCO44wQz ++ cat /tmp/tmp.inIl6k7Aw4 ++ rm /tmp/tmp.UAbCO44wQz /tmp/tmp.inIl6k7Aw4 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=83 + echo -n . .+ [[ 83 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UJRpuYN7Zz +++ mktemp ++ local LAST_ERR=/tmp/tmp.NnTkFzAqIM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UJRpuYN7Zz ++ cat /tmp/tmp.NnTkFzAqIM ++ rm /tmp/tmp.UJRpuYN7Zz /tmp/tmp.NnTkFzAqIM ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=84 + echo -n . .+ [[ 84 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lvO8yGeF8L +++ mktemp ++ local LAST_ERR=/tmp/tmp.QTmePSslJc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lvO8yGeF8L ++ cat /tmp/tmp.QTmePSslJc ++ rm /tmp/tmp.lvO8yGeF8L /tmp/tmp.QTmePSslJc ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=85 + echo -n . .+ [[ 85 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aDjIj3ZEF0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.XMfuglegOP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aDjIj3ZEF0 ++ cat /tmp/tmp.XMfuglegOP ++ rm /tmp/tmp.aDjIj3ZEF0 /tmp/tmp.XMfuglegOP ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=86 + echo -n . .+ [[ 86 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.srTATTPXnr +++ mktemp ++ local LAST_ERR=/tmp/tmp.FpOjgtAcgz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.srTATTPXnr ++ cat /tmp/tmp.FpOjgtAcgz ++ rm /tmp/tmp.srTATTPXnr /tmp/tmp.FpOjgtAcgz ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=87 + echo -n . .+ [[ 87 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WORfgzayHO +++ mktemp ++ local LAST_ERR=/tmp/tmp.sBBZk8Qnq9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WORfgzayHO ++ cat /tmp/tmp.sBBZk8Qnq9 ++ rm /tmp/tmp.WORfgzayHO /tmp/tmp.sBBZk8Qnq9 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=88 + echo -n . .+ [[ 88 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rNgzumNXun +++ mktemp ++ local LAST_ERR=/tmp/tmp.oDuqeOjLjj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rNgzumNXun ++ cat /tmp/tmp.oDuqeOjLjj ++ rm /tmp/tmp.rNgzumNXun /tmp/tmp.oDuqeOjLjj ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=89 + echo -n . .+ [[ 89 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RnHsCoV6cT +++ mktemp ++ local LAST_ERR=/tmp/tmp.l8eUiWr5YP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.RnHsCoV6cT ++ cat /tmp/tmp.l8eUiWr5YP ++ rm /tmp/tmp.RnHsCoV6cT /tmp/tmp.l8eUiWr5YP ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=90 + echo -n . .+ [[ 90 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xoqeiavfSx +++ mktemp ++ local LAST_ERR=/tmp/tmp.kQBgBDfbBI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xoqeiavfSx ++ cat /tmp/tmp.kQBgBDfbBI ++ rm /tmp/tmp.xoqeiavfSx /tmp/tmp.kQBgBDfbBI ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=91 + echo -n . .+ [[ 91 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vgXKsDLHSM +++ mktemp ++ local LAST_ERR=/tmp/tmp.jqBf2s1w48 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vgXKsDLHSM ++ cat /tmp/tmp.jqBf2s1w48 ++ rm /tmp/tmp.vgXKsDLHSM /tmp/tmp.jqBf2s1w48 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=92 + echo -n . .+ [[ 92 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J7Q5qkEr1k +++ mktemp ++ local LAST_ERR=/tmp/tmp.BIdujjeq2c ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J7Q5qkEr1k ++ cat /tmp/tmp.BIdujjeq2c ++ rm /tmp/tmp.J7Q5qkEr1k /tmp/tmp.BIdujjeq2c ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=93 + echo -n . .+ [[ 93 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vUuuxq9VYA +++ mktemp ++ local LAST_ERR=/tmp/tmp.beS3x1RiaM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vUuuxq9VYA ++ cat /tmp/tmp.beS3x1RiaM ++ rm /tmp/tmp.vUuuxq9VYA /tmp/tmp.beS3x1RiaM ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=94 + echo -n . .+ [[ 94 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.THIERudy9t +++ mktemp ++ local LAST_ERR=/tmp/tmp.t6wbwQiJFm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.THIERudy9t ++ cat /tmp/tmp.t6wbwQiJFm ++ rm /tmp/tmp.THIERudy9t /tmp/tmp.t6wbwQiJFm ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=95 + echo -n . .+ [[ 95 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RZVdMS9k8S +++ mktemp ++ local LAST_ERR=/tmp/tmp.miulhMQQk5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.RZVdMS9k8S ++ cat /tmp/tmp.miulhMQQk5 ++ rm /tmp/tmp.RZVdMS9k8S /tmp/tmp.miulhMQQk5 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=96 + echo -n . .+ [[ 96 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.igrYMzGzSN +++ mktemp ++ local LAST_ERR=/tmp/tmp.81RGNcvJ3d ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.igrYMzGzSN ++ cat /tmp/tmp.81RGNcvJ3d ++ rm /tmp/tmp.igrYMzGzSN /tmp/tmp.81RGNcvJ3d ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=97 + echo -n . .+ [[ 97 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lxedz8G7qQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.qkkqDlsN1T ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lxedz8G7qQ ++ cat /tmp/tmp.qkkqDlsN1T ++ rm /tmp/tmp.lxedz8G7qQ /tmp/tmp.qkkqDlsN1T ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=98 + echo -n . .+ [[ 98 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LJSarx1JHX +++ mktemp ++ local LAST_ERR=/tmp/tmp.0YaZA2EWQC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LJSarx1JHX ++ cat /tmp/tmp.0YaZA2EWQC ++ rm /tmp/tmp.LJSarx1JHX /tmp/tmp.0YaZA2EWQC ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=99 + echo -n . .+ [[ 99 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MCs5mYyOMc +++ mktemp ++ local LAST_ERR=/tmp/tmp.MyWxxoGFBI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MCs5mYyOMc ++ cat /tmp/tmp.MyWxxoGFBI ++ rm /tmp/tmp.MCs5mYyOMc /tmp/tmp.MyWxxoGFBI ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=100 + echo -n . .+ [[ 100 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e8LqBzaF2K +++ mktemp ++ local LAST_ERR=/tmp/tmp.oAN8aE8HNl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.e8LqBzaF2K ++ cat /tmp/tmp.oAN8aE8HNl ++ rm /tmp/tmp.e8LqBzaF2K /tmp/tmp.oAN8aE8HNl ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=101 + echo -n . .+ [[ 101 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mHb1BoZCTb +++ mktemp ++ local LAST_ERR=/tmp/tmp.oIJFvf5UL7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mHb1BoZCTb ++ cat /tmp/tmp.oIJFvf5UL7 ++ rm /tmp/tmp.mHb1BoZCTb /tmp/tmp.oIJFvf5UL7 ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=102 + echo -n . .+ [[ 102 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rx0tQuQGrL +++ mktemp ++ local LAST_ERR=/tmp/tmp.KOV6egBGnc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rx0tQuQGrL ++ cat /tmp/tmp.KOV6egBGnc ++ rm /tmp/tmp.rx0tQuQGrL /tmp/tmp.KOV6egBGnc ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=103 + echo -n . .+ [[ 103 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.61uDrUTNI8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zhmUVKiSg9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.61uDrUTNI8 ++ cat /tmp/tmp.zhmUVKiSg9 ++ rm /tmp/tmp.61uDrUTNI8 /tmp/tmp.zhmUVKiSg9 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=104 + echo -n . .+ [[ 104 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8FPgnTktkV +++ mktemp ++ local LAST_ERR=/tmp/tmp.DYUHZJVc6C ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8FPgnTktkV ++ cat /tmp/tmp.DYUHZJVc6C ++ rm /tmp/tmp.8FPgnTktkV /tmp/tmp.DYUHZJVc6C ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=105 + echo -n . .+ [[ 105 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.47beGAU0dV +++ mktemp ++ local LAST_ERR=/tmp/tmp.ebqH43ud5p ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.47beGAU0dV ++ cat /tmp/tmp.ebqH43ud5p ++ rm /tmp/tmp.47beGAU0dV /tmp/tmp.ebqH43ud5p ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=106 + echo -n . .+ [[ 106 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kXXcTfp6Ny +++ mktemp ++ local LAST_ERR=/tmp/tmp.eVQ2k8uJFY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kXXcTfp6Ny ++ cat /tmp/tmp.eVQ2k8uJFY ++ rm /tmp/tmp.kXXcTfp6Ny /tmp/tmp.eVQ2k8uJFY ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=107 + echo -n . .+ [[ 107 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.obKNKE0Y31 +++ mktemp ++ local LAST_ERR=/tmp/tmp.fdBNnfsajs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.obKNKE0Y31 ++ cat /tmp/tmp.fdBNnfsajs ++ rm /tmp/tmp.obKNKE0Y31 /tmp/tmp.fdBNnfsajs ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=108 + echo -n . .+ [[ 108 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.P733WziAOE +++ mktemp ++ local LAST_ERR=/tmp/tmp.7NS1ICv2rh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.P733WziAOE ++ cat /tmp/tmp.7NS1ICv2rh ++ rm /tmp/tmp.P733WziAOE /tmp/tmp.7NS1ICv2rh ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=109 + echo -n . .+ [[ 109 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rDR9emokB7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.NAWw3VRIKn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rDR9emokB7 ++ cat /tmp/tmp.NAWw3VRIKn ++ rm /tmp/tmp.rDR9emokB7 /tmp/tmp.NAWw3VRIKn ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=110 + echo -n . .+ [[ 110 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xAIXRadsWU +++ mktemp ++ local LAST_ERR=/tmp/tmp.2pdVCXSmzH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xAIXRadsWU ++ cat /tmp/tmp.2pdVCXSmzH ++ rm /tmp/tmp.xAIXRadsWU /tmp/tmp.2pdVCXSmzH ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=111 + echo -n . .+ [[ 111 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.v1YeCukP8k +++ mktemp ++ local LAST_ERR=/tmp/tmp.BSPh0gKYDB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.v1YeCukP8k ++ cat /tmp/tmp.BSPh0gKYDB ++ rm /tmp/tmp.v1YeCukP8k /tmp/tmp.BSPh0gKYDB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=112 + echo -n . .+ [[ 112 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bTwsA0l5Ib +++ mktemp ++ local LAST_ERR=/tmp/tmp.TWggc0p4v4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bTwsA0l5Ib ++ cat /tmp/tmp.TWggc0p4v4 ++ rm /tmp/tmp.bTwsA0l5Ib /tmp/tmp.TWggc0p4v4 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=113 + echo -n . .+ [[ 113 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XQxVprs4Wy +++ mktemp ++ local LAST_ERR=/tmp/tmp.x108UsLKAl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XQxVprs4Wy ++ cat /tmp/tmp.x108UsLKAl ++ rm /tmp/tmp.XQxVprs4Wy /tmp/tmp.x108UsLKAl ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=114 + echo -n . .+ [[ 114 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PVTsqxti6X +++ mktemp ++ local LAST_ERR=/tmp/tmp.dWN6cj2JnU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PVTsqxti6X ++ cat /tmp/tmp.dWN6cj2JnU ++ rm /tmp/tmp.PVTsqxti6X /tmp/tmp.dWN6cj2JnU ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=115 + echo -n . .+ [[ 115 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SApWu9iCzK +++ mktemp ++ local LAST_ERR=/tmp/tmp.UsBNZFF8cH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SApWu9iCzK ++ cat /tmp/tmp.UsBNZFF8cH ++ rm /tmp/tmp.SApWu9iCzK /tmp/tmp.UsBNZFF8cH ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=116 + echo -n . .+ [[ 116 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NqAz26V8h2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.HY4bPioZvS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NqAz26V8h2 ++ cat /tmp/tmp.HY4bPioZvS ++ rm /tmp/tmp.NqAz26V8h2 /tmp/tmp.HY4bPioZvS ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=117 + echo -n . .+ [[ 117 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9NfoNTeYSW +++ mktemp ++ local LAST_ERR=/tmp/tmp.hBpqG6VnVr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9NfoNTeYSW ++ cat /tmp/tmp.hBpqG6VnVr ++ rm /tmp/tmp.9NfoNTeYSW /tmp/tmp.hBpqG6VnVr ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=118 + echo -n . .+ [[ 118 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZhwLucTSwx +++ mktemp ++ local LAST_ERR=/tmp/tmp.JAZyy9H3Lt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZhwLucTSwx ++ cat /tmp/tmp.JAZyy9H3Lt ++ rm /tmp/tmp.ZhwLucTSwx /tmp/tmp.JAZyy9H3Lt ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=119 + echo -n . .+ [[ 119 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XCSmGcXxiV +++ mktemp ++ local LAST_ERR=/tmp/tmp.U3mNWPGPdD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XCSmGcXxiV ++ cat /tmp/tmp.U3mNWPGPdD ++ rm /tmp/tmp.XCSmGcXxiV /tmp/tmp.U3mNWPGPdD ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=120 + echo -n . .+ [[ 120 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.p2GVlCiRjx +++ mktemp ++ local LAST_ERR=/tmp/tmp.y1rTRpNQZz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.p2GVlCiRjx ++ cat /tmp/tmp.y1rTRpNQZz ++ rm /tmp/tmp.p2GVlCiRjx /tmp/tmp.y1rTRpNQZz ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=121 + echo -n . .+ [[ 121 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZRVibBJw7A +++ mktemp ++ local LAST_ERR=/tmp/tmp.glPLJ2TyvW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZRVibBJw7A ++ cat /tmp/tmp.glPLJ2TyvW ++ rm /tmp/tmp.ZRVibBJw7A /tmp/tmp.glPLJ2TyvW ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=122 + echo -n . .+ [[ 122 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pQI4NCYJoH +++ mktemp ++ local LAST_ERR=/tmp/tmp.kEqlE1tn7L ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pQI4NCYJoH ++ cat /tmp/tmp.kEqlE1tn7L ++ rm /tmp/tmp.pQI4NCYJoH /tmp/tmp.kEqlE1tn7L ++ return 0 + [[ ready =~ ready ]] + echo + log 'psmdb/some-name is ready: OK' + set +o xtrace [2026-04-14T11:24:06+0000] psmdb/some-name is ready: OK + desc 'create users with auth enabled' + set +o xtrace ----------------------------------------------------------------------------------- create users with auth enabled ----------------------------------------------------------------------------------- + run_mongos 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lEaVQuWW0b +++ mktemp ++ local LAST_ERR=/tmp/tmp.yyov8jEHzP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lEaVQuWW0b ++ cat /tmp/tmp.yyov8jEHzP ++ rm /tmp/tmp.lEaVQuWW0b /tmp/tmp.yyov8jEHzP ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.TIjBXilq2Y ++ mktemp + local LAST_ERR=/tmp/tmp.UVaXvod3lG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TIjBXilq2Y Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("d77b02ff-96f3-4288-ab04-0960ed76547a") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" } ] } bye + cat /tmp/tmp.UVaXvod3lG + rm /tmp/tmp.TIjBXilq2Y /tmp/tmp.UVaXvod3lG + return 0 + desc 'verify existing data is still accessible with auth' + set +o xtrace ----------------------------------------------------------------------------------- verify existing data is still accessible with auth ----------------------------------------------------------------------------------- + compare_mongos_cmd find myApp:myPass@some-name-mongos.disabled-auth-30730 -with-auth '' myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local postfix=-with-auth + local suffix= + local database=myApp + local collection=test + local port=27019 + local tls=false + [[ false == true ]] + mongos_command=run_mongos + log 'running db.test.command() in myApp' + set +o xtrace [2026-04-14T11:24:08+0000] running db.test.command() in myApp + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.disabled-auth-30730 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C9yhoMTa2F +++ mktemp ++ local LAST_ERR=/tmp/tmp.FNYrXxJGAF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C9yhoMTa2F ++ cat /tmp/tmp.FNYrXxJGAF ++ rm /tmp/tmp.C9yhoMTa2F /tmp/tmp.FNYrXxJGAF ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.ugObqXWLJc ++ mktemp + local LAST_ERR=/tmp/tmp.nriCzYsEWn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ugObqXWLJc + cat /tmp/tmp.nriCzYsEWn + rm /tmp/tmp.ugObqXWLJc /tmp/tmp.nriCzYsEWn + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/compare/find-with-auth.json /tmp/tmp.yuUMqVy3ER/find-with-auth + desc 'insert new data with auth' + set +o xtrace ----------------------------------------------------------------------------------- insert new data with auth ----------------------------------------------------------------------------------- + run_mongos 'use myApp\n db.test.insert({x: 200500})' myApp:myPass@some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({x: 200500})' + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uQAvpWKHmm +++ mktemp ++ local LAST_ERR=/tmp/tmp.1ZODvwhVDh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uQAvpWKHmm ++ cat /tmp/tmp.1ZODvwhVDh ++ rm /tmp/tmp.uQAvpWKHmm /tmp/tmp.1ZODvwhVDh ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 200500})\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.TYsnFW3TxG ++ mktemp + local LAST_ERR=/tmp/tmp.1MejT8emtN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 200500})\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TYsnFW3TxG Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5c5dadc6-e424-493c-b18c-7c6bf4dd5d66") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.1MejT8emtN + rm /tmp/tmp.TYsnFW3TxG /tmp/tmp.1MejT8emtN + return 0 + desc 'wait for backup agents after auth change' + set +o xtrace ----------------------------------------------------------------------------------- wait for backup agents after auth change ----------------------------------------------------------------------------------- + wait_backup_agent some-name-rs0-0 + local agent_pod=some-name-rs0-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs0-0...2026-04-14T11:23:15.000+0000 I listening for the commands + wait_backup_agent some-name-rs1-0 + local agent_pod=some-name-rs1-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs1-0...2026-04-14T11:20:17.000+0000 I listening for the commands + wait_backup_agent some-name-rs2-0 + local agent_pod=some-name-rs2-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs2-0...2026-04-14T11:20:17.000+0000 I listening for the commands + backup_name_with_auth=backup-with-auth + desc 'run backup with auth enabled' + set +o xtrace ----------------------------------------------------------------------------------- run backup with auth enabled ----------------------------------------------------------------------------------- + run_backup minio backup-with-auth + local storage=minio + local backup_name=backup-with-auth + local type=logical + log 'running backup backup-with-auth' + set +o xtrace [2026-04-14T11:24:17+0000] running backup backup-with-auth + yq eval $'.metadata.name = "backup-with-auth"\n\t\t\t| .spec.storageName = "minio"\n\t\t\t| .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/backup-minio.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.GZfNA2ljmb ++ mktemp + local LAST_ERR=/tmp/tmp.7G2PHbLIeX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GZfNA2ljmb perconaservermongodbbackup.psmdb.percona.com/backup-with-auth created + cat /tmp/tmp.7G2PHbLIeX + rm /tmp/tmp.GZfNA2ljmb /tmp/tmp.7G2PHbLIeX + return 0 + wait_backup backup-with-auth + local backup_name=backup-with-auth + local target_state=ready + set +o xtrace waiting for backup-with-auth to reach ready state..................OK + desc 'insert more data with auth' + set +o xtrace ----------------------------------------------------------------------------------- insert more data with auth ----------------------------------------------------------------------------------- + run_mongos 'use myApp\n db.test.insert({x: 200501})' myApp:myPass@some-name-mongos.disabled-auth-30730 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({x: 200501})' + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zkEEeWigVn +++ mktemp ++ local LAST_ERR=/tmp/tmp.uJ5edTK9x1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zkEEeWigVn ++ cat /tmp/tmp.uJ5edTK9x1 ++ rm /tmp/tmp.zkEEeWigVn /tmp/tmp.uJ5edTK9x1 ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 200501})\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.kep5BtyKq9 ++ mktemp + local LAST_ERR=/tmp/tmp.kx9vZsmdUa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.insert({x: 200501})\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.kep5BtyKq9 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("3f74a685-53b8-4ba9-931c-036f794c2d61") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.kx9vZsmdUa + rm /tmp/tmp.kep5BtyKq9 /tmp/tmp.kx9vZsmdUa + return 0 + desc 'verify new data exists' + set +o xtrace ----------------------------------------------------------------------------------- verify new data exists ----------------------------------------------------------------------------------- + compare_mongos_cmd find myApp:myPass@some-name-mongos.disabled-auth-30730 -after-insert-auth '' myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local postfix=-after-insert-auth + local suffix= + local database=myApp + local collection=test + local port=27019 + local tls=false + [[ false == true ]] + mongos_command=run_mongos + log 'running db.test.command() in myApp' + set +o xtrace [2026-04-14T11:24:56+0000] running db.test.command() in myApp + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.disabled-auth-30730 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JWAIIT2RIM +++ mktemp ++ local LAST_ERR=/tmp/tmp.4IdkBrzf6G ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JWAIIT2RIM ++ cat /tmp/tmp.4IdkBrzf6G ++ rm /tmp/tmp.JWAIIT2RIM /tmp/tmp.4IdkBrzf6G ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.krciTF7OcE ++ mktemp + local LAST_ERR=/tmp/tmp.wwnpoWVwj3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.krciTF7OcE + cat /tmp/tmp.wwnpoWVwj3 + rm /tmp/tmp.krciTF7OcE /tmp/tmp.wwnpoWVwj3 + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/compare/find-after-insert-auth.json /tmp/tmp.yuUMqVy3ER/find-after-insert-auth + desc 'restore from backup (with auth)' + set +o xtrace ----------------------------------------------------------------------------------- restore from backup (with auth) ----------------------------------------------------------------------------------- + run_restore backup-with-auth + local backup_name=backup-with-auth + local restore_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/restore.yml + log 'running restore restore-backup-with-auth' + set +o xtrace [2026-04-14T11:24:59+0000] running restore restore-backup-with-auth + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/conf/restore.yml + /usr/sbin/sed -e 's/backupName:/backupName: backup-with-auth/' + /usr/sbin/sed -e 's/name:/name: restore-backup-with-auth/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.SOWCx2oZTm ++ mktemp + local LAST_ERR=/tmp/tmp.g24o0Xpf8D + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SOWCx2oZTm perconaservermongodbrestore.psmdb.percona.com/restore-backup-with-auth created + cat /tmp/tmp.g24o0Xpf8D + rm /tmp/tmp.SOWCx2oZTm /tmp/tmp.g24o0Xpf8D + return 0 + wait_restore backup-with-auth some-name + local backup_name=backup-with-auth + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-with-auth object to be created.OK Waiting psmdb-restore/restore-backup-with-auth to reach state "ready" .OK after 0 minutes + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MIWNx1IHxf +++ mktemp ++ local LAST_ERR=/tmp/tmp.KhJJMn7CXj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MIWNx1IHxf ++ cat /tmp/tmp.KhJJMn7CXj ++ rm /tmp/tmp.MIWNx1IHxf /tmp/tmp.KhJJMn7CXj ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qnZ3vn54FW +++ mktemp ++ local LAST_ERR=/tmp/tmp.2hOOwGkEqA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qnZ3vn54FW ++ cat /tmp/tmp.2hOOwGkEqA ++ rm /tmp/tmp.qnZ3vn54FW /tmp/tmp.2hOOwGkEqA ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jOBXadOYKQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.LWfUlt67oI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jOBXadOYKQ ++ cat /tmp/tmp.LWfUlt67oI ++ rm /tmp/tmp.jOBXadOYKQ /tmp/tmp.LWfUlt67oI ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f1FtK4XDPt +++ mktemp ++ local LAST_ERR=/tmp/tmp.x4UP9TJH6v ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f1FtK4XDPt ++ cat /tmp/tmp.x4UP9TJH6v ++ rm /tmp/tmp.f1FtK4XDPt /tmp/tmp.x4UP9TJH6v ++ return 0 + [[ initializing == ready ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mlyyn6gqj8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.oatllg9zLH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mlyyn6gqj8 ++ cat /tmp/tmp.oatllg9zLH ++ rm /tmp/tmp.mlyyn6gqj8 /tmp/tmp.oatllg9zLH ++ return 0 + [[ ready == ready ]] + echo .OK .OK + desc 'verify data was restored to state before last insert' + set +o xtrace ----------------------------------------------------------------------------------- verify data was restored to state before last insert ----------------------------------------------------------------------------------- + compare_mongos_cmd find myApp:myPass@some-name-mongos.disabled-auth-30730 -after-restore-auth '' myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local postfix=-after-restore-auth + local suffix= + local database=myApp + local collection=test + local port=27019 + local tls=false + [[ false == true ]] + mongos_command=run_mongos + log 'running db.test.command() in myApp' + set +o xtrace [2026-04-14T11:26:27+0000] running db.test.command() in myApp + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.disabled-auth-30730 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.disabled-auth-30730 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KmQIpori36 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ctf3B4yWJ1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KmQIpori36 ++ cat /tmp/tmp.ctf3B4yWJ1 ++ rm /tmp/tmp.KmQIpori36 /tmp/tmp.ctf3B4yWJ1 ++ return 0 + local client_container=psmdb-client-bb8b97679-bbjgs + kubectl_bin exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.3aoKX8E1gP ++ mktemp + local LAST_ERR=/tmp/tmp.oB83Lg1BF9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-bbjgs -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.disabled-auth-30730.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3aoKX8E1gP + cat /tmp/tmp.oB83Lg1BF9 + rm /tmp/tmp.3aoKX8E1gP /tmp/tmp.oB83Lg1BF9 + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/e2e-tests/disabled-auth/compare/find-after-restore-auth.json /tmp/tmp.yuUMqVy3ER/find-after-restore-auth + desc 'cleanup backups' + set +o xtrace ----------------------------------------------------------------------------------- cleanup backups ----------------------------------------------------------------------------------- + kubectl_bin delete psmdb-backup --all ++ mktemp + local LAST_OUT=/tmp/tmp.NgkxqOFf5p ++ mktemp + local LAST_ERR=/tmp/tmp.BykmnXbBl6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete psmdb-backup --all + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.NgkxqOFf5p perconaservermongodbbackup.psmdb.percona.com "backup-no-auth" deleted from disabled-auth-30730 namespace perconaservermongodbbackup.psmdb.percona.com "backup-with-auth" deleted from disabled-auth-30730 namespace + cat /tmp/tmp.BykmnXbBl6 + rm /tmp/tmp.NgkxqOFf5p /tmp/tmp.BykmnXbBl6 + return 0 + destroy disabled-auth-30730 + local namespace=disabled-auth-30730 + local ignore_logs=true + [[ 0 == 1 ]] + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_backups + desc 'Delete psmdb-backup' + set +o xtrace ----------------------------------------------------------------------------------- Delete psmdb-backup ----------------------------------------------------------------------------------- ++ kubectl_bin get psmdb-backup --no-headers ++ wc -l +++ mktemp ++ local LAST_OUT=/tmp/tmp.yGvhyQEwSi +++ mktemp ++ local LAST_ERR=/tmp/tmp.zNapb2q0qH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb-backup --no-headers ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yGvhyQEwSi ++ cat /tmp/tmp.zNapb2q0qH No resources found in disabled-auth-30730 namespace. ++ rm /tmp/tmp.yGvhyQEwSi /tmp/tmp.zNapb2q0qH ++ return 0 + '[' 0 '!=' 0 ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.XwjxVE9bSs ++ mktemp + local LAST_ERR=/tmp/tmp.TgsNzIQOjE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XwjxVE9bSs customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.TgsNzIQOjE + rm /tmp/tmp.XwjxVE9bSs /tmp/tmp.TgsNzIQOjE + return 0 ++ grep -v '\-\-\-' ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/crd.yaml grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.buhpY6xULl ++ mktemp + local LAST_ERR=/tmp/tmp.yI8xSALATl + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.buhpY6xULl + cat /tmp/tmp.yI8xSALATl + rm /tmp/tmp.buhpY6xULl /tmp/tmp.yI8xSALATl + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.zZUjuyf92f ++ mktemp + local LAST_ERR=/tmp/tmp.C1SpW56DMR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zZUjuyf92f + cat /tmp/tmp.C1SpW56DMR + rm /tmp/tmp.zZUjuyf92f /tmp/tmp.C1SpW56DMR + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.DwIvxll1wZ ++ mktemp + local LAST_ERR=/tmp/tmp.HdbcY9KCEV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DwIvxll1wZ + cat /tmp/tmp.HdbcY9KCEV + rm /tmp/tmp.DwIvxll1wZ /tmp/tmp.HdbcY9KCEV + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.rZWTCrTara ++ mktemp + local LAST_ERR=/tmp/tmp.RymCpo4cfC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2256/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rZWTCrTara clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.RymCpo4cfC + rm /tmp/tmp.rZWTCrTara /tmp/tmp.RymCpo4cfC + return 0 + destroy_cert_manager + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.4AQ1SAwZwp ++ mktemp + local LAST_ERR=/tmp/tmp.mUpQVCeDwb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.4AQ1SAwZwp + cat /tmp/tmp.mUpQVCeDwb Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 0 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.4AQ1SAwZwp + cat /tmp/tmp.mUpQVCeDwb Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 4 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.4AQ1SAwZwp + cat /tmp/tmp.mUpQVCeDwb Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 8 + cat /tmp/tmp.4AQ1SAwZwp + cat /tmp/tmp.mUpQVCeDwb Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + rm /tmp/tmp.4AQ1SAwZwp /tmp/tmp.mUpQVCeDwb + return 1 + true + '[' -n '' ']' + '[' -n psmdb-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace disabled-auth-30730 + rm -rf /tmp/tmp.yuUMqVy3ER + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.h7SS81iOX9 + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.FUuYGpi1rW test passed ----------------------------------------------------------------------------------- ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.3ItHiUt5zw + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.7dF45sV9x6 ++ seq 0 2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace disabled-auth-30730 + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator