Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/logs/init-deploy.log Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 + max_conn=17 + create_infra init-deploy-6157 + local ns=init-deploy-6157 + [[ 1 == 1 ]] + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.p8cV53eKBZ ++ mktemp + local LAST_ERR=/tmp/tmp.qAC1kVf4U3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.p8cV53eKBZ customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.qAC1kVf4U3 + rm /tmp/tmp.p8cV53eKBZ /tmp/tmp.qAC1kVf4U3 + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml ++ grep -v '\-\-\-' grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.bKvLqxIpAU ++ mktemp + local LAST_ERR=/tmp/tmp.LCWcRxXl0W + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bKvLqxIpAU + cat /tmp/tmp.LCWcRxXl0W + rm /tmp/tmp.bKvLqxIpAU /tmp/tmp.LCWcRxXl0W + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.d5URWWVscs ++ mktemp + local LAST_ERR=/tmp/tmp.7Qc7IRWuWJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.d5URWWVscs + cat /tmp/tmp.7Qc7IRWuWJ + rm /tmp/tmp.d5URWWVscs /tmp/tmp.7Qc7IRWuWJ + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.5TGfEvzOK8 ++ mktemp + local LAST_ERR=/tmp/tmp.8AwphWcySG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5TGfEvzOK8 + cat /tmp/tmp.8AwphWcySG + rm /tmp/tmp.5TGfEvzOK8 /tmp/tmp.8AwphWcySG + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.aQB2kNbneK ++ mktemp + local LAST_ERR=/tmp/tmp.RHWT4jt0IV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aQB2kNbneK clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.RHWT4jt0IV + rm /tmp/tmp.aQB2kNbneK /tmp/tmp.RHWT4jt0IV + return 0 + check_crd_for_deletion PR-2299-0b924c09 + local git_tag=PR-2299-0b924c09 ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-2299-0b924c09/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/sbin/sed s/---//g ++ /usr/sbin/sed ':a;N;$!ba;s/\n/ /g' + for crd_name in $(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '.metadata.name' | $sed 's/---//g' | $sed ':a;N;$!ba;s/\n/ /g') ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gaF83XivQY +++ mktemp ++ local LAST_ERR=/tmp/tmp.kbApy0mjFD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.gaF83XivQY ++ cat /tmp/tmp.kbApy0mjFD Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.gaF83XivQY ++ cat /tmp/tmp.kbApy0mjFD Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.gaF83XivQY ++ cat /tmp/tmp.kbApy0mjFD Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.gaF83XivQY ++ cat /tmp/tmp.kbApy0mjFD Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.gaF83XivQY /tmp/tmp.kbApy0mjFD ++ return 1 + [[ '' == Terminating ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + set +o xtrace + xargs kubectl delete ns ++ mktemp ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.dj6bv1c9Bk ++ mktemp + local LAST_OUT=/tmp/tmp.V9x5mNDR1d ++ mktemp + local LAST_ERR=/tmp/tmp.jWcOHf3XsQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.WXt5O7gZs1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get ns + for i in $(seq 0 2) + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.dj6bv1c9Bk + cat /tmp/tmp.jWcOHf3XsQ + rm /tmp/tmp.dj6bv1c9Bk /tmp/tmp.jWcOHf3XsQ + return 0 namespace "init-deploy-29950" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.V9x5mNDR1d namespace "psmdb-operator" deleted + cat /tmp/tmp.WXt5O7gZs1 + rm /tmp/tmp.V9x5mNDR1d /tmp/tmp.WXt5O7gZs1 + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.Xhb3FB0Rnv ++ mktemp + local LAST_ERR=/tmp/tmp.TK9OosxBoa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Xhb3FB0Rnv + cat /tmp/tmp.TK9OosxBoa + rm /tmp/tmp.Xhb3FB0Rnv /tmp/tmp.TK9OosxBoa + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.HveBWnI8C3 ++ mktemp + local LAST_ERR=/tmp/tmp.cAS3KkgWCx + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HveBWnI8C3 namespace/psmdb-operator created + cat /tmp/tmp.cAS3KkgWCx + rm /tmp/tmp.HveBWnI8C3 /tmp/tmp.cAS3KkgWCx + return 0 + set_kube_ctx psmdb-operator + local namespace=psmdb-operator ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.bj59D3liuz +++ mktemp ++ local LAST_ERR=/tmp/tmp.KZCpE7t0zh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bj59D3liuz ++ cat /tmp/tmp.KZCpE7t0zh ++ rm /tmp/tmp.bj59D3liuz /tmp/tmp.KZCpE7t0zh ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.eKRScpBmHC ++ mktemp + local LAST_ERR=/tmp/tmp.cBtkRjPHUV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.eKRScpBmHC Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3" modified. + cat /tmp/tmp.cBtkRjPHUV + rm /tmp/tmp.eKRScpBmHC /tmp/tmp.cBtkRjPHUV + return 0 + deploy_operator + desc 'start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2299-0b924c09' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2299-0b924c09 ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.hafF9C7BXk ++ mktemp + local LAST_ERR=/tmp/tmp.2DtxvJ4IcC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hafF9C7BXk customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.2DtxvJ4IcC + rm /tmp/tmp.hafF9C7BXk /tmp/tmp.2DtxvJ4IcC + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: psmdb-operator^' + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.Pi3ev2lfiK ++ mktemp + local LAST_ERR=/tmp/tmp.ZbCj5xXfYu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Pi3ev2lfiK clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.ZbCj5xXfYu + rm /tmp/tmp.Pi3ev2lfiK /tmp/tmp.ZbCj5xXfYu + return 0 + yq eval $'\n\t\t\t(.spec.template.spec.containers[].image = "docker.io/perconalab/percona-server-mongodb-operator:PR-2299-0b924c09") |\n\t\t\t((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") |\n\t\t\t((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-operator.yaml + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.86xFjAvAdr ++ mktemp + local LAST_ERR=/tmp/tmp.OpbkpCAqCK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.86xFjAvAdr deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.OpbkpCAqCK + rm /tmp/tmp.86xFjAvAdr /tmp/tmp.OpbkpCAqCK + return 0 + sleep 20 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.P7JnB01P35 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Gs0LzqaBaJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.P7JnB01P35 ++ cat /tmp/tmp.Gs0LzqaBaJ ++ rm /tmp/tmp.P7JnB01P35 /tmp/tmp.Gs0LzqaBaJ ++ return 0 + wait_operator_pod percona-server-mongodb-operator-58df979d5d-78425 + local pod=percona-server-mongodb-operator-58df979d5d-78425 + set +o xtrace waiting for pod/percona-server-mongodb-operator-58df979d5d-78425 to be ready.OK + echo 'Print operator info from log' Print operator info from log + grep 'Manager starting up' ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.0fd6Kqueaa +++ mktemp ++ local LAST_ERR=/tmp/tmp.XuxAtPgaob ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0fd6Kqueaa ++ cat /tmp/tmp.XuxAtPgaob ++ rm /tmp/tmp.0fd6Kqueaa /tmp/tmp.XuxAtPgaob ++ return 0 + kubectl_bin logs -n psmdb-operator percona-server-mongodb-operator-58df979d5d-78425 ++ mktemp + local LAST_OUT=/tmp/tmp.x6jAK9EGX6 ++ mktemp + local LAST_ERR=/tmp/tmp.HgU4NycadR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl logs -n psmdb-operator percona-server-mongodb-operator-58df979d5d-78425 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.x6jAK9EGX6 + cat /tmp/tmp.HgU4NycadR + rm /tmp/tmp.x6jAK9EGX6 /tmp/tmp.HgU4NycadR + return 0 2026-04-02T14:31:25.807Z INFO setup Manager starting up {"gitCommit": "0b924c099a34a710007208d591ec054b99f27249", "gitBranch": "PR-2299-0b924c09", "buildTime": "", "goVersion": "go1.25.8", "os": "linux", "arch": "amd64"} + create_namespace init-deploy-6157 + local namespace=init-deploy-6157 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces init-deploy-6157' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces init-deploy-6157 ----------------------------------------------------------------------------------- ++ mktemp + kubectl_bin delete namespace init-deploy-6157 --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.LwPEdNplWb ++ mktemp + local LAST_OUT=/tmp/tmp.OvahogJxFo ++ mktemp + local LAST_ERR=/tmp/tmp.2J7TgjzgCi + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.5ocsd3KejM + local exit_status=0 + local timeout=4 + for i in $(seq 0 2) + set +e + kubectl get ns ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete namespace init-deploy-6157 --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.LwPEdNplWb + cat /tmp/tmp.2J7TgjzgCi + rm /tmp/tmp.LwPEdNplWb /tmp/tmp.2J7TgjzgCi + return 0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.OvahogJxFo + cat /tmp/tmp.5ocsd3KejM + rm /tmp/tmp.OvahogJxFo /tmp/tmp.5ocsd3KejM + return 0 + kubectl_bin wait --for=delete namespace init-deploy-6157 ++ mktemp error: resource(s) were provided, but no name was specified + local LAST_OUT=/tmp/tmp.Arz1HTh2I6 ++ mktemp + local LAST_ERR=/tmp/tmp.1JeFJywygF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace init-deploy-6157 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Arz1HTh2I6 + cat /tmp/tmp.1JeFJywygF + rm /tmp/tmp.Arz1HTh2I6 /tmp/tmp.1JeFJywygF + return 0 + desc 'create namespace init-deploy-6157' + set +o xtrace ----------------------------------------------------------------------------------- create namespace init-deploy-6157 ----------------------------------------------------------------------------------- + kubectl_bin create namespace init-deploy-6157 ++ mktemp + local LAST_OUT=/tmp/tmp.ugRIHlhgRb ++ mktemp + local LAST_ERR=/tmp/tmp.MjUBoz1CZW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace init-deploy-6157 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ugRIHlhgRb namespace/init-deploy-6157 created + cat /tmp/tmp.MjUBoz1CZW + rm /tmp/tmp.ugRIHlhgRb /tmp/tmp.MjUBoz1CZW + return 0 + set_kube_ctx init-deploy-6157 + local namespace=init-deploy-6157 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.jSaj9ISAkg +++ mktemp ++ local LAST_ERR=/tmp/tmp.8Hc1XtAdbr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jSaj9ISAkg ++ cat /tmp/tmp.8Hc1XtAdbr ++ rm /tmp/tmp.jSaj9ISAkg /tmp/tmp.8Hc1XtAdbr ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3 --namespace=init-deploy-6157 ++ mktemp + local LAST_OUT=/tmp/tmp.xA3qtfFGoU ++ mktemp + local LAST_ERR=/tmp/tmp.TGZ8A8KQrE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3 --namespace=init-deploy-6157 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xA3qtfFGoU Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2299-0b924c09-1-cluster3" modified. + cat /tmp/tmp.TGZ8A8KQrE + rm /tmp/tmp.xA3qtfFGoU /tmp/tmp.TGZ8A8KQrE + return 0 + desc 'create secrets and start client' + set +o xtrace ----------------------------------------------------------------------------------- create secrets and start client ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/secrets_with_tls.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.wykvVybO4c ++ mktemp + local LAST_ERR=/tmp/tmp.IvDbwLSLUG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/secrets_with_tls.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wykvVybO4c secret/some-users created secret/some-name-ssl created secret/some-name-ssl-internal created deployment.apps/psmdb-client created + cat /tmp/tmp.IvDbwLSLUG + rm /tmp/tmp.wykvVybO4c /tmp/tmp.IvDbwLSLUG + return 0 + desc 'create custom RuntimeClass' + set +o xtrace ----------------------------------------------------------------------------------- create custom RuntimeClass ----------------------------------------------------------------------------------- + version_gt 1.19 ++ echo '1.32 >= 1.19' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' 0 -ne 1 ']' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/container-rc.yaml + /usr/sbin/sed s/docker/runc/g + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.EglNG1iOPh ++ mktemp + local LAST_ERR=/tmp/tmp.L2DbO78m2t + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EglNG1iOPh runtimeclass.node.k8s.io/container-rc unchanged + cat /tmp/tmp.L2DbO78m2t + rm /tmp/tmp.EglNG1iOPh /tmp/tmp.L2DbO78m2t + return 0 + cluster=some-name-rs0 + desc 'create first PSMDB cluster some-name-rs0' + set +o xtrace ----------------------------------------------------------------------------------- create first PSMDB cluster some-name-rs0 ----------------------------------------------------------------------------------- + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/some-name-rs0.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/some-name-rs0.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/some-name-rs0.yml ++ mktemp + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + local LAST_OUT=/tmp/tmp.rugNz9bbPn + yq eval '.spec.upgradeOptions.apply="Never"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' ++ mktemp + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2299-0b924c09"' + /usr/sbin/sed -e s/NAME_SPACE/init-deploy-6157/g + local LAST_ERR=/tmp/tmp.tCwNiVPzLP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rugNz9bbPn perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.tCwNiVPzLP + rm /tmp/tmp.rugNz9bbPn /tmp/tmp.tCwNiVPzLP + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready..............OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.................OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oDcGISNLN4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.15pTcOMelz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oDcGISNLN4 ++ cat /tmp/tmp.15pTcOMelz ++ rm /tmp/tmp.oDcGISNLN4 /tmp/tmp.15pTcOMelz ++ return 0 + [[ '' == true ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready...................OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PmZ0kih2MG +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ge0rVdRcBA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PmZ0kih2MG ++ cat /tmp/tmp.Ge0rVdRcBA ++ rm /tmp/tmp.PmZ0kih2MG /tmp/tmp.Ge0rVdRcBA ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NJPWvE5vBW +++ mktemp ++ local LAST_ERR=/tmp/tmp.QwQ2sv0tr7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NJPWvE5vBW ++ cat /tmp/tmp.QwQ2sv0tr7 ++ rm /tmp/tmp.NJPWvE5vBW /tmp/tmp.QwQ2sv0tr7 ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/some-name-rs0 + local resource=statefulset/some-name-rs0 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_some-name-rs0.yml + local new_result=/tmp/tmp.hoVuIlaYJ6/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_some-name-rs0-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs0 + yq eval $'\n\t\t\tdel(.metadata.ownerReferences[].apiVersion) |\n\t\t\tdel(.metadata.managedFields) |\n\t\t\tdel(.. | select(has("creationTimestamp")).creationTimestamp) |\n\t\t\tdel(.. | select(has("namespace")).namespace) |\n\t\t\tdel(.. | select(has("uid")).uid) |\n\t\t\tdel(.metadata.resourceVersion) |\n\t\t\tdel(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) |\n\t\t\tdel(.metadata.selfLink) |\n\t\t\tdel(.metadata.annotations."cloud.google.com/neg") |\n\t\t\tdel(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") |\n\t\t\tdel(.. | select(has("image")).image) |\n\t\t\tdel(.. | select(has("clusterIP")).clusterIP) |\n\t\t\tdel(.. | select(has("clusterIPs")).clusterIPs) |\n\t\t\tdel(.. | select(has("dataSource")).dataSource) |\n\t\t\tdel(.. | select(has("procMount")).procMount) |\n\t\t\tdel(.. | select(has("storageClassName")).storageClassName) |\n\t\t\tdel(.. | select(has("finalizers")).finalizers) |\n\t\t\tdel(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") |\n\t\t\tdel(.. | select(has("volumeName")).volumeName) |\n\t\t\tdel(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.spec.volumeMode) |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") |\n\t\t\tdel(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") |\n\t\t\tdel(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") |\n\t\t\tdel(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) |\n\t\t\tdel(.. | select(has("healthCheckNodePort")).healthCheckNodePort) |\n\t\t\tdel(.. | select(has("nodePort")).nodePort) |\n\t\t\tdel(.status) |\n\t\t\t(.. | select(tag == "!!str")) |= sub("init-deploy-6157", "NAME_SPACE") |\n\t\t\tdel(.spec.volumeClaimTemplates[].apiVersion) |\n\t\t\tdel(.spec.volumeClaimTemplates[].kind) |\n\t\t\tdel(.spec.ipFamilies) |\n\t\t\tdel(.spec.ipFamilyPolicy) |\n\t\t\t(.. | select(. == "extensions/v1beta1")) = "apps/v1" |\n\t\t\t(.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.xMIBjpcCzP ++ mktemp + local LAST_ERR=/tmp/tmp.4T9yf4sEE6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xMIBjpcCzP + cat /tmp/tmp.4T9yf4sEE6 + rm /tmp/tmp.xMIBjpcCzP /tmp/tmp.4T9yf4sEE6 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.hoVuIlaYJ6/statefulset_some-name-rs0.yml + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.hoVuIlaYJ6/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.hoVuIlaYJ6/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_some-name-rs0.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_some-name-rs0.yml /tmp/tmp.hoVuIlaYJ6/statefulset_some-name-rs0.yml + log 'compare_kubectl: statefulset/some-name-rs0 OK' + set +o xtrace [2026-04-02T14:34:02+0000] compare_kubectl: statefulset/some-name-rs0 OK + compare_kubectl service/some-name-rs0 + local resource=service/some-name-rs0 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_some-name-rs0.yml + local new_result=/tmp/tmp.hoVuIlaYJ6/service_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_some-name-rs0-oc.yml ']' + kubectl_bin get -o yaml service/some-name-rs0 + yq eval $'\n\t\t\tdel(.metadata.ownerReferences[].apiVersion) |\n\t\t\tdel(.metadata.managedFields) |\n\t\t\tdel(.. | select(has("creationTimestamp")).creationTimestamp) |\n\t\t\tdel(.. | select(has("namespace")).namespace) |\n\t\t\tdel(.. | select(has("uid")).uid) |\n\t\t\tdel(.metadata.resourceVersion) |\n\t\t\tdel(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) |\n\t\t\tdel(.metadata.selfLink) |\n\t\t\tdel(.metadata.annotations."cloud.google.com/neg") |\n\t\t\tdel(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") |\n\t\t\tdel(.. | select(has("image")).image) |\n\t\t\tdel(.. | select(has("clusterIP")).clusterIP) |\n\t\t\tdel(.. | select(has("clusterIPs")).clusterIPs) |\n\t\t\tdel(.. | select(has("dataSource")).dataSource) |\n\t\t\tdel(.. | select(has("procMount")).procMount) |\n\t\t\tdel(.. | select(has("storageClassName")).storageClassName) |\n\t\t\tdel(.. | select(has("finalizers")).finalizers) |\n\t\t\tdel(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") |\n\t\t\tdel(.. | select(has("volumeName")).volumeName) |\n\t\t\tdel(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.spec.volumeMode) |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") |\n\t\t\tdel(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") |\n\t\t\tdel(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") |\n\t\t\tdel(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) |\n\t\t\tdel(.. | select(has("healthCheckNodePort")).healthCheckNodePort) |\n\t\t\tdel(.. | select(has("nodePort")).nodePort) |\n\t\t\tdel(.status) |\n\t\t\t(.. | select(tag == "!!str")) |= sub("init-deploy-6157", "NAME_SPACE") |\n\t\t\tdel(.spec.volumeClaimTemplates[].apiVersion) |\n\t\t\tdel(.spec.volumeClaimTemplates[].kind) |\n\t\t\tdel(.spec.ipFamilies) |\n\t\t\tdel(.spec.ipFamilyPolicy) |\n\t\t\t(.. | select(. == "extensions/v1beta1")) = "apps/v1" |\n\t\t\t(.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.BnQGAUY6BR ++ mktemp + local LAST_ERR=/tmp/tmp.laKf757dw3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get -o yaml service/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BnQGAUY6BR + cat /tmp/tmp.laKf757dw3 + rm /tmp/tmp.BnQGAUY6BR /tmp/tmp.laKf757dw3 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.hoVuIlaYJ6/service_some-name-rs0.yml + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.hoVuIlaYJ6/service_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.hoVuIlaYJ6/service_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_some-name-rs0.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_some-name-rs0.yml /tmp/tmp.hoVuIlaYJ6/service_some-name-rs0.yml + log 'compare_kubectl: service/some-name-rs0 OK' + set +o xtrace [2026-04-02T14:34:03+0000] compare_kubectl: service/some-name-rs0 OK + desc 'check if users created' + set +o xtrace ----------------------------------------------------------------------------------- check if users created ----------------------------------------------------------------------------------- + secret_name=some-users ++ getUserData some-users MONGODB_USER_ADMIN_USER ++ local secretName=some-users ++ local dataKey=MONGODB_USER_ADMIN_USER +++ getSecretData some-users MONGODB_USER_ADMIN_USER +++ local secretName=some-users +++ local dataKey=MONGODB_USER_ADMIN_USER ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_USER_ADMIN_USER}}' ++++ base64 -d +++ local data=userAdmin +++ echo userAdmin ++ urlencode userAdmin ++ uri=userAdmin ++ echo -n userAdmin ++ jq -s -R -r @uri + user=userAdmin ++ getUserData some-users MONGODB_USER_ADMIN_PASSWORD ++ local secretName=some-users ++ local dataKey=MONGODB_USER_ADMIN_PASSWORD +++ getSecretData some-users MONGODB_USER_ADMIN_PASSWORD +++ local secretName=some-users +++ local dataKey=MONGODB_USER_ADMIN_PASSWORD ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_USER_ADMIN_PASSWORD}}' ++++ base64 -d +++ local data=userAdmin123456 +++ echo userAdmin123456 ++ urlencode userAdmin123456 ++ uri=userAdmin123456 ++ echo -n userAdmin123456 ++ jq -s -R -r @uri + pass=userAdmin123456 + compare_mongo_user userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 userAdmin + local uri=userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 + local user=userAdmin + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/userAdmin.json + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.2 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.4 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 5\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 6\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 7\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/userAdmin-80.json ']' + expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/userAdmin-80.json + run_mongo 'db.runCommand({connectionStatus:1,showPrivileges:true})' userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 + local 'command=db.runCommand({connectionStatus:1,showPrivileges:true})' + local uri=userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] + grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' + sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + sed -e '$s/,$/}/' + /usr/sbin/sed -e '/"ok" : 1/,+4d' +++ mktemp + jq '.authInfo.authenticatedUserPrivileges|=sort_by(.resource.anyResource, .resource.cluster, .resource.db, .resource.collection)|.authInfo.authenticatedUserRoles|=sort_by(.role)' ++ local LAST_OUT=/tmp/tmp.XTF0tHTxnQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.Y3wHXTFrGF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XTF0tHTxnQ ++ cat /tmp/tmp.Y3wHXTFrGF ++ rm /tmp/tmp.XTF0tHTxnQ /tmp/tmp.Y3wHXTFrGF ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.mk49LbBuGq ++ mktemp + local LAST_ERR=/tmp/tmp.DWRV085ct5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mk49LbBuGq + cat /tmp/tmp.DWRV085ct5 + rm /tmp/tmp.mk49LbBuGq /tmp/tmp.DWRV085ct5 + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/userAdmin-80.json /tmp/tmp.hoVuIlaYJ6/userAdmin.json ++ getUserData some-users MONGODB_BACKUP_USER ++ local secretName=some-users ++ local dataKey=MONGODB_BACKUP_USER +++ getSecretData some-users MONGODB_BACKUP_USER +++ local secretName=some-users +++ local dataKey=MONGODB_BACKUP_USER ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_BACKUP_USER}}' ++++ base64 -d +++ local data=backup +++ echo backup ++ urlencode backup ++ uri=backup ++ echo -n backup ++ jq -s -R -r @uri + user=backup ++ getUserData some-users MONGODB_BACKUP_PASSWORD ++ local secretName=some-users ++ local dataKey=MONGODB_BACKUP_PASSWORD +++ getSecretData some-users MONGODB_BACKUP_PASSWORD +++ local secretName=some-users +++ local dataKey=MONGODB_BACKUP_PASSWORD ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_BACKUP_PASSWORD}}' ++++ base64 -d +++ local data=backup123456# +++ echo backup123456# ++ urlencode backup123456# ++ uri=backup123456# ++ echo -n backup123456# ++ jq -s -R -r @uri + pass=backup123456%23 + compare_mongo_user backup:backup123456%23@some-name-rs0.init-deploy-6157 backup + local uri=backup:backup123456%23@some-name-rs0.init-deploy-6157 + local user=backup + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/backup.json + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.2 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.4 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 5\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 6\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 7\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/backup-80.json ']' + expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/backup-80.json + run_mongo 'db.runCommand({connectionStatus:1,showPrivileges:true})' backup:backup123456%23@some-name-rs0.init-deploy-6157 + local 'command=db.runCommand({connectionStatus:1,showPrivileges:true})' + local uri=backup:backup123456%23@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ backup:backup123456%23@some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' + sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' +++ mktemp + /usr/sbin/sed -e '/"ok" : 1/,+4d' + jq '.authInfo.authenticatedUserPrivileges|=sort_by(.resource.anyResource, .resource.cluster, .resource.db, .resource.collection)|.authInfo.authenticatedUserRoles|=sort_by(.role)' + sed -e '$s/,$/}/' ++ local LAST_OUT=/tmp/tmp.J5DPOIugiL +++ mktemp ++ local LAST_ERR=/tmp/tmp.OKfFO9OpzX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J5DPOIugiL ++ cat /tmp/tmp.OKfFO9OpzX ++ rm /tmp/tmp.J5DPOIugiL /tmp/tmp.OKfFO9OpzX ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://backup:backup123456%23@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.8fQ92sUWR3 ++ mktemp + local LAST_ERR=/tmp/tmp.qovrqDeNco + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://backup:backup123456%23@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.8fQ92sUWR3 + cat /tmp/tmp.qovrqDeNco + rm /tmp/tmp.8fQ92sUWR3 /tmp/tmp.qovrqDeNco + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/backup-80.json /tmp/tmp.hoVuIlaYJ6/backup.json ++ getUserData some-users MONGODB_CLUSTER_ADMIN_USER ++ local secretName=some-users ++ local dataKey=MONGODB_CLUSTER_ADMIN_USER +++ getSecretData some-users MONGODB_CLUSTER_ADMIN_USER +++ local secretName=some-users +++ local dataKey=MONGODB_CLUSTER_ADMIN_USER ++++ base64 -d ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_CLUSTER_ADMIN_USER}}' +++ local data=clusterAdmin +++ echo clusterAdmin ++ urlencode clusterAdmin ++ uri=clusterAdmin ++ echo -n clusterAdmin ++ jq -s -R -r @uri + user=clusterAdmin ++ getUserData some-users MONGODB_CLUSTER_ADMIN_PASSWORD ++ local secretName=some-users ++ local dataKey=MONGODB_CLUSTER_ADMIN_PASSWORD +++ getSecretData some-users MONGODB_CLUSTER_ADMIN_PASSWORD +++ local secretName=some-users +++ local dataKey=MONGODB_CLUSTER_ADMIN_PASSWORD ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_CLUSTER_ADMIN_PASSWORD}}' ++++ base64 -d +++ local data=clusterAdmin123456 +++ echo clusterAdmin123456 ++ urlencode clusterAdmin123456 ++ uri=clusterAdmin123456 ++ echo -n clusterAdmin123456 ++ jq -s -R -r @uri + pass=clusterAdmin123456 + compare_mongo_user clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 clusterAdmin + local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 + local user=clusterAdmin + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterAdmin.json + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.2 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.4 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 5\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 6\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 7\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterAdmin-80.json ']' + expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterAdmin-80.json + run_mongo 'db.runCommand({connectionStatus:1,showPrivileges:true})' clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 + local 'command=db.runCommand({connectionStatus:1,showPrivileges:true})' + local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] + sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + /usr/sbin/sed -e '/"ok" : 1/,+4d' + sed -e '$s/,$/}/' + grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' +++ mktemp + jq '.authInfo.authenticatedUserPrivileges|=sort_by(.resource.anyResource, .resource.cluster, .resource.db, .resource.collection)|.authInfo.authenticatedUserRoles|=sort_by(.role)' ++ local LAST_OUT=/tmp/tmp.6zuFlGvOd3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.e37RXBhQxS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6zuFlGvOd3 ++ cat /tmp/tmp.e37RXBhQxS ++ rm /tmp/tmp.6zuFlGvOd3 /tmp/tmp.e37RXBhQxS ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.q3hROerSCW ++ mktemp + local LAST_ERR=/tmp/tmp.ao20hY0o6F + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.q3hROerSCW + cat /tmp/tmp.ao20hY0o6F + rm /tmp/tmp.q3hROerSCW /tmp/tmp.ao20hY0o6F + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterAdmin-80.json /tmp/tmp.hoVuIlaYJ6/clusterAdmin.json ++ getUserData some-users MONGODB_CLUSTER_MONITOR_USER ++ local secretName=some-users ++ local dataKey=MONGODB_CLUSTER_MONITOR_USER +++ getSecretData some-users MONGODB_CLUSTER_MONITOR_USER +++ local secretName=some-users +++ local dataKey=MONGODB_CLUSTER_MONITOR_USER ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_CLUSTER_MONITOR_USER}}' ++++ base64 -d +++ local data=clusterMonitor +++ echo clusterMonitor ++ urlencode clusterMonitor ++ uri=clusterMonitor ++ echo -n clusterMonitor ++ jq -s -R -r @uri + user=clusterMonitor ++ getUserData some-users MONGODB_CLUSTER_MONITOR_PASSWORD ++ local secretName=some-users ++ local dataKey=MONGODB_CLUSTER_MONITOR_PASSWORD +++ getSecretData some-users MONGODB_CLUSTER_MONITOR_PASSWORD +++ local secretName=some-users +++ local dataKey=MONGODB_CLUSTER_MONITOR_PASSWORD ++++ kubectl get secrets/some-users '--template={{.data.MONGODB_CLUSTER_MONITOR_PASSWORD}}' ++++ base64 -d +++ local data=clusterMonitor123456 +++ echo clusterMonitor123456 ++ urlencode clusterMonitor123456 ++ uri=clusterMonitor123456 ++ echo -n clusterMonitor123456 ++ jq -s -R -r @uri + pass=clusterMonitor123456 + compare_mongo_user clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157 clusterMonitor + local uri=clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157 + local user=clusterMonitor + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterMonitor.json + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.2 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 4\.4 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 5\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 6\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 7\.0 ]] + [[ docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterMonitor-80.json ']' + expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterMonitor-80.json + run_mongo 'db.runCommand({connectionStatus:1,showPrivileges:true})' clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157 + local 'command=db.runCommand({connectionStatus:1,showPrivileges:true})' + local uri=clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157 == *cfg* ]] + sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' + grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + /usr/sbin/sed -e '/"ok" : 1/,+4d' + sed -e '$s/,$/}/' + jq '.authInfo.authenticatedUserPrivileges|=sort_by(.resource.anyResource, .resource.cluster, .resource.db, .resource.collection)|.authInfo.authenticatedUserRoles|=sort_by(.role)' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bcFLdyzDr0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.uQRxkVYZch ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bcFLdyzDr0 ++ cat /tmp/tmp.uQRxkVYZch ++ rm /tmp/tmp.bcFLdyzDr0 /tmp/tmp.uQRxkVYZch ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.nZS0hVJHyl ++ mktemp + local LAST_ERR=/tmp/tmp.5k4aJbxVPO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.runCommand({connectionStatus:1,showPrivileges:true})\n'\'' | mongo mongodb+srv://clusterMonitor:clusterMonitor123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nZS0hVJHyl + cat /tmp/tmp.5k4aJbxVPO + rm /tmp/tmp.nZS0hVJHyl /tmp/tmp.5k4aJbxVPO + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/clusterMonitor-80.json /tmp/tmp.hoVuIlaYJ6/clusterMonitor.json + grep 'Authentication failed' Error: can't connect to new replica set master [some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017], err: AuthenticationFailed: Authentication failed. : Error: can't connect to new replica set master [some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017], err: AuthenticationFailed: Authentication failed. : Error: can't connect to new replica set master [some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017], err: AuthenticationFailed: Authentication failed. : Error: can't connect to new replica set master [some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017], err: AuthenticationFailed: Authentication failed. : + desc 'create user' + set +o xtrace ----------------------------------------------------------------------------------- create user ----------------------------------------------------------------------------------- + run_mongo 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QcbzOvkc5c +++ mktemp ++ local LAST_ERR=/tmp/tmp.mveQFVFzyH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QcbzOvkc5c ++ cat /tmp/tmp.mveQFVFzyH ++ rm /tmp/tmp.QcbzOvkc5c /tmp/tmp.mveQFVFzyH ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.T45qyL7ZRp ++ mktemp + local LAST_ERR=/tmp/tmp.rIwOGGbYvL + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.T45qyL7ZRp Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("ab7afc5a-e8fd-4b96-9c51-23ea1e69d533") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" } ] } bye + cat /tmp/tmp.rIwOGGbYvL + rm /tmp/tmp.T45qyL7ZRp /tmp/tmp.rIwOGGbYvL + return 0 + sleep 2 + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mongo 'use myApp\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-rs0.init-deploy-6157 + local 'command=use myApp\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mQ9FP7fx0M +++ mktemp ++ local LAST_ERR=/tmp/tmp.k4wxPYldiO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mQ9FP7fx0M ++ cat /tmp/tmp.k4wxPYldiO ++ rm /tmp/tmp.mQ9FP7fx0M /tmp/tmp.k4wxPYldiO ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.rQBuyRMcGk ++ mktemp + local LAST_ERR=/tmp/tmp.LQalzf4bdt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rQBuyRMcGk Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("763b4c35-cc5f-4bf4-8a90-512182392788") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.LQalzf4bdt + rm /tmp/tmp.rQBuyRMcGk /tmp/tmp.LQalzf4bdt + return 0 + compare_mongo_cmd find myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 + local command=find + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:34:47+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 == *cfg* ]] + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6FsVlpwz6m +++ mktemp ++ local LAST_ERR=/tmp/tmp.tJqssBniNc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6FsVlpwz6m ++ cat /tmp/tmp.tJqssBniNc ++ rm /tmp/tmp.6FsVlpwz6m /tmp/tmp.tJqssBniNc ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.mr7W30yuda ++ mktemp + local LAST_ERR=/tmp/tmp.3vqDiXMUBF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mr7W30yuda + cat /tmp/tmp.3vqDiXMUBF + rm /tmp/tmp.mr7W30yuda /tmp/tmp.3vqDiXMUBF + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find.json /tmp/tmp.hoVuIlaYJ6/find + compare_mongo_cmd find myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 + local command=find + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:34:49+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 mongodb '' '' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local 'command=use myApp\n db.test.find()' + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.c9mxWt52eV +++ mktemp ++ local LAST_ERR=/tmp/tmp.oOmffbxDv7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.c9mxWt52eV ++ cat /tmp/tmp.oOmffbxDv7 ++ rm /tmp/tmp.c9mxWt52eV /tmp/tmp.oOmffbxDv7 ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.HEzyctfbj7 ++ mktemp + local LAST_ERR=/tmp/tmp.5QykDsxvwo + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HEzyctfbj7 + cat /tmp/tmp.5QykDsxvwo + rm /tmp/tmp.HEzyctfbj7 /tmp/tmp.5QykDsxvwo + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find.json /tmp/tmp.hoVuIlaYJ6/find + compare_mongo_cmd find myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 + local command=find + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:34:52+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 mongodb '' '' + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uzCTUAdZN0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qAr1Cyw5hC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uzCTUAdZN0 ++ cat /tmp/tmp.qAr1Cyw5hC ++ rm /tmp/tmp.uzCTUAdZN0 /tmp/tmp.qAr1Cyw5hC ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.fiyOpK7nLD ++ mktemp + local LAST_ERR=/tmp/tmp.nE48BzKiUX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fiyOpK7nLD + cat /tmp/tmp.nE48BzKiUX + rm /tmp/tmp.fiyOpK7nLD /tmp/tmp.nE48BzKiUX + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find.json /tmp/tmp.hoVuIlaYJ6/find + desc 'check number of connections' + set +o xtrace ----------------------------------------------------------------------------------- check number of connections ----------------------------------------------------------------------------------- ++ run_mongo 'db.serverStatus().connections.current' clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 ++ local 'command=db.serverStatus().connections.current' ++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 ++ local driver=mongodb+srv ++ local suffix=.svc.cluster.local ++ local mongo_flag= ++ local replica_set=rs0 ++ [[ clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] ++ grep -E -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|bye' +++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.sswLkcRfgE ++++ mktemp +++ local LAST_ERR=/tmp/tmp.cnLI225VZS +++ local exit_status=0 +++ local timeout=4 ++++ seq 0 2 +++ for i in $(seq 0 2) +++ set +e +++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 -a -n 1 ']' +++ break +++ cat /tmp/tmp.sswLkcRfgE +++ cat /tmp/tmp.cnLI225VZS +++ rm /tmp/tmp.sswLkcRfgE /tmp/tmp.cnLI225VZS +++ return 0 ++ local client_container=psmdb-client-bb8b97679-nhg77 ++ kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.serverStatus().connections.current\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yE7nDWDris +++ mktemp ++ local LAST_ERR=/tmp/tmp.9G1bekbMi1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.serverStatus().connections.current\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yE7nDWDris ++ cat /tmp/tmp.9G1bekbMi1 ++ rm /tmp/tmp.yE7nDWDris /tmp/tmp.9G1bekbMi1 ++ return 0 + conn_count=15 + '[' 15 -gt 17 ']' + desc 'kill Primary Pod, check reelection, check data' + set +o xtrace ----------------------------------------------------------------------------------- kill Primary Pod, check reelection, check data ----------------------------------------------------------------------------------- ++ get_mongo_primary clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 some-name-rs0 ++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 ++ local cluster=some-name-rs0 ++ set_debug ++ [[ 1 == 1 ]] ++ set -o xtrace +++ get_mongo_primary_endpoint clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ run_mongo 'db.hello().me' clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 mongodb :27017 +++ grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' +++ grep ':27017$' +++ local 'command=db.hello().me' +++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ local driver=mongodb +++ local suffix=:27017 +++ local mongo_flag= +++ local replica_set=rs0 +++ [[ clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] +++ sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' ++++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++++ mktemp ++++ local LAST_OUT=/tmp/tmp.p5N49ZG3U8 +++++ mktemp ++++ local LAST_ERR=/tmp/tmp.ZX6gTorjSX ++++ local exit_status=0 ++++ local timeout=4 +++++ seq 0 2 ++++ for i in $(seq 0 2) ++++ set +e ++++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++++ exit_status=0 ++++ set -e ++++ '[' 0 '!=' 0 -a -n 1 ']' ++++ break ++++ cat /tmp/tmp.p5N49ZG3U8 ++++ cat /tmp/tmp.ZX6gTorjSX ++++ rm /tmp/tmp.p5N49ZG3U8 /tmp/tmp.ZX6gTorjSX ++++ return 0 +++ local client_container=psmdb-client-bb8b97679-nhg77 +++ kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.hello().me\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157:27017/admin?ssl=false\&replicaSet=rs0 ' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.mbzgFgOCcQ ++++ mktemp +++ local LAST_ERR=/tmp/tmp.TFdepmuq13 +++ local exit_status=0 +++ local timeout=4 ++++ seq 0 2 +++ for i in $(seq 0 2) +++ set +e +++ kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.hello().me\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157:27017/admin?ssl=false\&replicaSet=rs0 ' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 -a -n 1 ']' +++ break +++ cat /tmp/tmp.mbzgFgOCcQ +++ cat /tmp/tmp.TFdepmuq13 +++ rm /tmp/tmp.mbzgFgOCcQ /tmp/tmp.TFdepmuq13 +++ return 0 ++ endpoint=some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 ++ [[ some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 =~ \.some-name-rs0 ]] ++ echo some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 ++ cut -d . -f 1 + initial_primary=some-name-rs0-0 + kubectl_bin delete pods --grace-period=0 --force some-name-rs0-0 ++ mktemp + local LAST_OUT=/tmp/tmp.wzCneO43Kd ++ mktemp + local LAST_ERR=/tmp/tmp.mU0uqkkwbT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete pods --grace-period=0 --force some-name-rs0-0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wzCneO43Kd pod "some-name-rs0-0" force deleted from init-deploy-6157 namespace + cat /tmp/tmp.mU0uqkkwbT Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. + rm /tmp/tmp.wzCneO43Kd /tmp/tmp.mU0uqkkwbT + return 0 + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready............OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lMR74kyAi5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ibFxMwr1z7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lMR74kyAi5 ++ cat /tmp/tmp.ibFxMwr1z7 ++ rm /tmp/tmp.lMR74kyAi5 /tmp/tmp.ibFxMwr1z7 ++ return 0 + [[ '' == true ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lthGqNFJVG +++ mktemp ++ local LAST_ERR=/tmp/tmp.8wi9JXbIR9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lthGqNFJVG ++ cat /tmp/tmp.8wi9JXbIR9 ++ rm /tmp/tmp.lthGqNFJVG /tmp/tmp.8wi9JXbIR9 ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qPzCYAO3rH +++ mktemp ++ local LAST_ERR=/tmp/tmp.xKNWCzaOyU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qPzCYAO3rH ++ cat /tmp/tmp.xKNWCzaOyU ++ rm /tmp/tmp.qPzCYAO3rH /tmp/tmp.xKNWCzaOyU ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness ++ get_mongo_primary clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 some-name-rs0 ++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 ++ local cluster=some-name-rs0 ++ set_debug ++ [[ 1 == 1 ]] ++ set -o xtrace +++ get_mongo_primary_endpoint clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ run_mongo 'db.hello().me' clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 mongodb :27017 +++ local 'command=db.hello().me' +++ local uri=clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 +++ local driver=mongodb +++ local suffix=:27017 +++ grep -E -v 'Time|Percona Server for MongoDB|bye|BinData|NumberLong|connecting to|Error saving history file|I NETWORK|W NETWORK|Implicit session:|versions do not match' +++ local mongo_flag= +++ local replica_set=rs0 +++ [[ clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157 == *cfg* ]] +++ sed -e 's^20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]\.[0-9][0-9][0-9]+[0-9][0-9][0-9][0-9]^^' ++++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ grep ':27017$' +++++ mktemp ++++ local LAST_OUT=/tmp/tmp.PX5wAYIN68 +++++ mktemp ++++ local LAST_ERR=/tmp/tmp.N0uWIApAzE ++++ local exit_status=0 ++++ local timeout=4 +++++ seq 0 2 ++++ for i in $(seq 0 2) ++++ set +e ++++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++++ exit_status=0 ++++ set -e ++++ '[' 0 '!=' 0 -a -n 1 ']' ++++ break ++++ cat /tmp/tmp.PX5wAYIN68 ++++ cat /tmp/tmp.N0uWIApAzE ++++ rm /tmp/tmp.PX5wAYIN68 /tmp/tmp.N0uWIApAzE ++++ return 0 +++ local client_container=psmdb-client-bb8b97679-nhg77 +++ kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.hello().me\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157:27017/admin?ssl=false\&replicaSet=rs0 ' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.YTfgtASWxM ++++ mktemp +++ local LAST_ERR=/tmp/tmp.zf4ldWwppt +++ local exit_status=0 +++ local timeout=4 ++++ seq 0 2 +++ for i in $(seq 0 2) +++ set +e +++ kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.hello().me\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-rs0.init-deploy-6157:27017/admin?ssl=false\&replicaSet=rs0 ' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 -a -n 1 ']' +++ break +++ cat /tmp/tmp.YTfgtASWxM +++ cat /tmp/tmp.zf4ldWwppt +++ rm /tmp/tmp.YTfgtASWxM /tmp/tmp.zf4ldWwppt +++ return 0 ++ endpoint=some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 ++ [[ some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 =~ \.some-name-rs0 ]] ++ echo some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017 ++ cut -d . -f 1 + changed_primary=some-name-rs0-1 + '[' some-name-rs0-0 '!=' some-name-rs0-1 ']' + run_mongo 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-rs0.init-deploy-6157 + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YAzbXbmImx +++ mktemp ++ local LAST_ERR=/tmp/tmp.mPj51fffKa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YAzbXbmImx ++ cat /tmp/tmp.mPj51fffKa ++ rm /tmp/tmp.YAzbXbmImx /tmp/tmp.mPj51fffKa ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.Xx9qS1w5gs ++ mktemp + local LAST_ERR=/tmp/tmp.A5Nv1oeA46 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Xx9qS1w5gs Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("f5dc6738-a19d-45f5-8141-dd321937770e") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.A5Nv1oeA46 + rm /tmp/tmp.Xx9qS1w5gs /tmp/tmp.A5Nv1oeA46 + return 0 + compare_mongo_cmd find myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 -2nd + local command=find + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 + local postfix=-2nd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:35:47+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157 == *cfg* ]] + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IzASyCHEn6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.fMIO74rB4B ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IzASyCHEn6 ++ cat /tmp/tmp.fMIO74rB4B ++ rm /tmp/tmp.IzASyCHEn6 /tmp/tmp.fMIO74rB4B ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.aUmXCCpShV ++ mktemp + local LAST_ERR=/tmp/tmp.lN4P559HDI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aUmXCCpShV + cat /tmp/tmp.lN4P559HDI + rm /tmp/tmp.aUmXCCpShV /tmp/tmp.lN4P559HDI + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-2nd.json /tmp/tmp.hoVuIlaYJ6/find-2nd + compare_mongo_cmd find myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 -2nd + local command=find + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 + local postfix=-2nd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:35:49+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 + local driver=mongodb + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + [[ myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ljYTmCeg7V +++ mktemp ++ local LAST_ERR=/tmp/tmp.lhqxyUwb4n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ljYTmCeg7V ++ cat /tmp/tmp.lhqxyUwb4n ++ rm /tmp/tmp.ljYTmCeg7V /tmp/tmp.lhqxyUwb4n ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.i3Lpj0gtyv ++ mktemp + local LAST_ERR=/tmp/tmp.AOpwIFuRfJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.i3Lpj0gtyv + cat /tmp/tmp.AOpwIFuRfJ + rm /tmp/tmp.i3Lpj0gtyv /tmp/tmp.AOpwIFuRfJ + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-2nd.json /tmp/tmp.hoVuIlaYJ6/find-2nd + compare_mongo_cmd find myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 -2nd + local command=find + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 + local postfix=-2nd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:35:52+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + [[ myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cSxmcsECo2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Y2CrBZRYky ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cSxmcsECo2 ++ cat /tmp/tmp.Y2CrBZRYky ++ rm /tmp/tmp.cSxmcsECo2 /tmp/tmp.Y2CrBZRYky ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.TQhQYWWYJ2 ++ mktemp + local LAST_ERR=/tmp/tmp.muvrUaVa0u + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TQhQYWWYJ2 + cat /tmp/tmp.muvrUaVa0u + rm /tmp/tmp.TQhQYWWYJ2 /tmp/tmp.muvrUaVa0u + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-2nd.json /tmp/tmp.hoVuIlaYJ6/find-2nd + desc 'check if possible to create second cluster' + set +o xtrace ----------------------------------------------------------------------------------- check if possible to create second cluster ----------------------------------------------------------------------------------- + cluster2=another-name-rs0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.EITN2SdpxY ++ mktemp + local LAST_ERR=/tmp/tmp.Gs00UwGAxg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EITN2SdpxY secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created secret/gcp-cs-sa-key-secret created + cat /tmp/tmp.Gs00UwGAxg + rm /tmp/tmp.EITN2SdpxY /tmp/tmp.Gs00UwGAxg + return 0 + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/another-name-rs0.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/another-name-rs0.yml + kubectl_bin apply -f - ++ mktemp + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2299-0b924c09"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' + local LAST_OUT=/tmp/tmp.oJQTbqxMGr + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/conf/another-name-rs0.yml ++ mktemp + /usr/sbin/sed -e s/NAME_SPACE/init-deploy-6157/g + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + local LAST_ERR=/tmp/tmp.9cXfPy402K + yq eval '.spec.upgradeOptions.apply="Never"' + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.oJQTbqxMGr perconaservermongodb.psmdb.percona.com/another-name created + cat /tmp/tmp.9cXfPy402K + rm /tmp/tmp.oJQTbqxMGr /tmp/tmp.9cXfPy402K + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- + wait_for_running another-name-rs0 3 + local name=another-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=another-name ++ seq 0 2 + for i in $(seq 0 $last_pod) + [[ 0 -eq 2 ]] + wait_pod another-name-rs0-0 + local pod=another-name-rs0-0 + set +o xtrace waiting for pod/another-name-rs0-0 to be ready...............OK + for i in $(seq 0 $last_pod) + [[ 1 -eq 2 ]] + wait_pod another-name-rs0-1 + local pod=another-name-rs0-1 + set +o xtrace waiting for pod/another-name-rs0-1 to be ready.............OK + for i in $(seq 0 $last_pod) + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yp2KeGOz7j +++ mktemp ++ local LAST_ERR=/tmp/tmp.2whi8WFiXF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yp2KeGOz7j ++ cat /tmp/tmp.2whi8WFiXF ++ rm /tmp/tmp.yp2KeGOz7j /tmp/tmp.2whi8WFiXF ++ return 0 + [[ '' == true ]] + wait_pod another-name-rs0-2 + local pod=another-name-rs0-2 + set +o xtrace waiting for pod/another-name-rs0-2 to be ready.............OK ++ kubectl_bin get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6D24f17iRo +++ mktemp ++ local LAST_ERR=/tmp/tmp.vs0GHYmPPC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].nonvoting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6D24f17iRo ++ cat /tmp/tmp.vs0GHYmPPC ++ rm /tmp/tmp.6D24f17iRo /tmp/tmp.vs0GHYmPPC ++ return 0 + [[ '' == true ]] ++ kubectl_bin get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VkdbtgrkJE +++ mktemp ++ local LAST_ERR=/tmp/tmp.92HRzDrEjF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb another-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].hidden.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VkdbtgrkJE ++ cat /tmp/tmp.92HRzDrEjF ++ rm /tmp/tmp.VkdbtgrkJE /tmp/tmp.92HRzDrEjF ++ return 0 + [[ '' == true ]] + sleep 10 + [[ true == true ]] + set +x Waiting for cluster readyness............ + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/another-name-rs0 + local resource=statefulset/another-name-rs0 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_another-name-rs0.yml + local new_result=/tmp/tmp.hoVuIlaYJ6/statefulset_another-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_another-name-rs0-oc.yml ']' + kubectl_bin get -o yaml statefulset/another-name-rs0 + yq eval $'\n\t\t\tdel(.metadata.ownerReferences[].apiVersion) |\n\t\t\tdel(.metadata.managedFields) |\n\t\t\tdel(.. | select(has("creationTimestamp")).creationTimestamp) |\n\t\t\tdel(.. | select(has("namespace")).namespace) |\n\t\t\tdel(.. | select(has("uid")).uid) |\n\t\t\tdel(.metadata.resourceVersion) |\n\t\t\tdel(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) |\n\t\t\tdel(.metadata.selfLink) |\n\t\t\tdel(.metadata.annotations."cloud.google.com/neg") |\n\t\t\tdel(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") |\n\t\t\tdel(.. | select(has("image")).image) |\n\t\t\tdel(.. | select(has("clusterIP")).clusterIP) |\n\t\t\tdel(.. | select(has("clusterIPs")).clusterIPs) |\n\t\t\tdel(.. | select(has("dataSource")).dataSource) |\n\t\t\tdel(.. | select(has("procMount")).procMount) |\n\t\t\tdel(.. | select(has("storageClassName")).storageClassName) |\n\t\t\tdel(.. | select(has("finalizers")).finalizers) |\n\t\t\tdel(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") |\n\t\t\tdel(.. | select(has("volumeName")).volumeName) |\n\t\t\tdel(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.spec.volumeMode) |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") |\n\t\t\tdel(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") |\n\t\t\tdel(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") |\n\t\t\tdel(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) |\n\t\t\tdel(.. | select(has("healthCheckNodePort")).healthCheckNodePort) |\n\t\t\tdel(.. | select(has("nodePort")).nodePort) |\n\t\t\tdel(.status) |\n\t\t\t(.. | select(tag == "!!str")) |= sub("init-deploy-6157", "NAME_SPACE") |\n\t\t\tdel(.spec.volumeClaimTemplates[].apiVersion) |\n\t\t\tdel(.spec.volumeClaimTemplates[].kind) |\n\t\t\tdel(.spec.ipFamilies) |\n\t\t\tdel(.spec.ipFamilyPolicy) |\n\t\t\t(.. | select(. == "extensions/v1beta1")) = "apps/v1" |\n\t\t\t(.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.wFO4S6ffcD ++ mktemp + local LAST_ERR=/tmp/tmp.5f7LTgatgf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get -o yaml statefulset/another-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wFO4S6ffcD + cat /tmp/tmp.5f7LTgatgf + rm /tmp/tmp.wFO4S6ffcD /tmp/tmp.5f7LTgatgf + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.hoVuIlaYJ6/statefulset_another-name-rs0.yml + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.hoVuIlaYJ6/statefulset_another-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.hoVuIlaYJ6/statefulset_another-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_another-name-rs0.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/statefulset_another-name-rs0.yml /tmp/tmp.hoVuIlaYJ6/statefulset_another-name-rs0.yml + log 'compare_kubectl: statefulset/another-name-rs0 OK' + set +o xtrace [2026-04-02T14:38:03+0000] compare_kubectl: statefulset/another-name-rs0 OK + compare_kubectl service/another-name-rs0 + local resource=service/another-name-rs0 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_another-name-rs0.yml + local new_result=/tmp/tmp.hoVuIlaYJ6/service_another-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_another-name-rs0-oc.yml ']' + kubectl_bin get -o yaml service/another-name-rs0 + yq eval $'\n\t\t\tdel(.metadata.ownerReferences[].apiVersion) |\n\t\t\tdel(.metadata.managedFields) |\n\t\t\tdel(.. | select(has("creationTimestamp")).creationTimestamp) |\n\t\t\tdel(.. | select(has("namespace")).namespace) |\n\t\t\tdel(.. | select(has("uid")).uid) |\n\t\t\tdel(.metadata.resourceVersion) |\n\t\t\tdel(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) |\n\t\t\tdel(.metadata.selfLink) |\n\t\t\tdel(.metadata.annotations."cloud.google.com/neg") |\n\t\t\tdel(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") |\n\t\t\tdel(.. | select(has("image")).image) |\n\t\t\tdel(.. | select(has("clusterIP")).clusterIP) |\n\t\t\tdel(.. | select(has("clusterIPs")).clusterIPs) |\n\t\t\tdel(.. | select(has("dataSource")).dataSource) |\n\t\t\tdel(.. | select(has("procMount")).procMount) |\n\t\t\tdel(.. | select(has("storageClassName")).storageClassName) |\n\t\t\tdel(.. | select(has("finalizers")).finalizers) |\n\t\t\tdel(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") |\n\t\t\tdel(.. | select(has("volumeName")).volumeName) |\n\t\t\tdel(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") |\n\t\t\tdel(.spec.volumeMode) |\n\t\t\tdel(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") |\n\t\t\tdel(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") |\n\t\t\tdel(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") |\n\t\t\tdel(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") |\n\t\t\tdel(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) |\n\t\t\tdel(.. | select(has("healthCheckNodePort")).healthCheckNodePort) |\n\t\t\tdel(.. | select(has("nodePort")).nodePort) |\n\t\t\tdel(.status) |\n\t\t\t(.. | select(tag == "!!str")) |= sub("init-deploy-6157", "NAME_SPACE") |\n\t\t\tdel(.spec.volumeClaimTemplates[].apiVersion) |\n\t\t\tdel(.spec.volumeClaimTemplates[].kind) |\n\t\t\tdel(.spec.ipFamilies) |\n\t\t\tdel(.spec.ipFamilyPolicy) |\n\t\t\t(.. | select(. == "extensions/v1beta1")) = "apps/v1" |\n\t\t\t(.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.sc4Jz5U2Rn ++ mktemp + local LAST_ERR=/tmp/tmp.kXI5uO41zN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get -o yaml service/another-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.sc4Jz5U2Rn + cat /tmp/tmp.kXI5uO41zN + rm /tmp/tmp.sc4Jz5U2Rn /tmp/tmp.kXI5uO41zN + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.hoVuIlaYJ6/service_another-name-rs0.yml + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.hoVuIlaYJ6/service_another-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.hoVuIlaYJ6/service_another-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_another-name-rs0.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/service_another-name-rs0.yml /tmp/tmp.hoVuIlaYJ6/service_another-name-rs0.yml + log 'compare_kubectl: service/another-name-rs0 OK' + set +o xtrace [2026-04-02T14:38:04+0000] compare_kubectl: service/another-name-rs0 OK + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mongo 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' userAdmin:userAdmin123456@another-name-rs0.init-deploy-6157 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@another-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ userAdmin:userAdmin123456@another-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NpnTIiSMgQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.XCWepuP0Jo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NpnTIiSMgQ ++ cat /tmp/tmp.XCWepuP0Jo ++ rm /tmp/tmp.NpnTIiSMgQ /tmp/tmp.XCWepuP0Jo ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.V9GXuWUCut ++ mktemp + local LAST_ERR=/tmp/tmp.JhRmO5DSM2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.V9GXuWUCut Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://another-name-rs0-0.another-name-rs0.init-deploy-6157.svc.cluster.local:27017,another-name-rs0-1.another-name-rs0.init-deploy-6157.svc.cluster.local:27017,another-name-rs0-2.another-name-rs0.init-deploy-6157.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("515c74d7-6bef-43ac-b3b8-6f5f72e1d512") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" } ] } bye + cat /tmp/tmp.JhRmO5DSM2 + rm /tmp/tmp.V9GXuWUCut /tmp/tmp.JhRmO5DSM2 + return 0 + run_mongo 'use myApp\n db.test.insert({ x: 100502 })' myApp:myPass@another-name-rs0.init-deploy-6157 + local 'command=use myApp\n db.test.insert({ x: 100502 })' + local uri=myApp:myPass@another-name-rs0.init-deploy-6157 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@another-name-rs0.init-deploy-6157 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vr9ZpAGSrE +++ mktemp ++ local LAST_ERR=/tmp/tmp.yFDGG22rYQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Vr9ZpAGSrE ++ cat /tmp/tmp.yFDGG22rYQ ++ rm /tmp/tmp.Vr9ZpAGSrE /tmp/tmp.yFDGG22rYQ ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100502 })\n'\'' | mongo mongodb+srv://myApp:myPass@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.MQUUBPSJgR ++ mktemp + local LAST_ERR=/tmp/tmp.ZtlOACkClM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100502 })\n'\'' | mongo mongodb+srv://myApp:myPass@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MQUUBPSJgR Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://another-name-rs0-2.another-name-rs0.init-deploy-6157.svc.cluster.local:27017,another-name-rs0-0.another-name-rs0.init-deploy-6157.svc.cluster.local:27017,another-name-rs0-1.another-name-rs0.init-deploy-6157.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("888f1d0f-82b8-4c05-a13a-114342402044") } Percona Server for MongoDB server version: v8.0.20-8 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.ZtlOACkClM + rm /tmp/tmp.MQUUBPSJgR /tmp/tmp.ZtlOACkClM + return 0 + compare_mongo_cmd find myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157 -3rd + local command=find + local uri=myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157 + local postfix=-3rd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:38:09+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157 + local driver=mongodb + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157 == *cfg* ]] + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nKQ9fMlmXa +++ mktemp ++ local LAST_ERR=/tmp/tmp.1ol9qcxdy4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nKQ9fMlmXa ++ cat /tmp/tmp.1ol9qcxdy4 ++ rm /tmp/tmp.nKQ9fMlmXa /tmp/tmp.1ol9qcxdy4 ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.TzRXj4SuZA ++ mktemp + local LAST_ERR=/tmp/tmp.W5DdZtRWrW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-0.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TzRXj4SuZA + cat /tmp/tmp.W5DdZtRWrW + rm /tmp/tmp.TzRXj4SuZA /tmp/tmp.W5DdZtRWrW + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-3rd.json /tmp/tmp.hoVuIlaYJ6/find-3rd + compare_mongo_cmd find myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157 -3rd + local command=find + local uri=myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157 + local postfix=-3rd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:38:11+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157 mongodb '' '' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157 == *cfg* ]] + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HbO2luA1Y3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Hy69mC7B0Q ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HbO2luA1Y3 ++ cat /tmp/tmp.Hy69mC7B0Q ++ rm /tmp/tmp.HbO2luA1Y3 /tmp/tmp.Hy69mC7B0Q ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.JSuKDVj926 ++ mktemp + local LAST_ERR=/tmp/tmp.w2X7gg8BYh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-1.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.JSuKDVj926 + cat /tmp/tmp.w2X7gg8BYh + rm /tmp/tmp.JSuKDVj926 /tmp/tmp.w2X7gg8BYh + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-3rd.json /tmp/tmp.hoVuIlaYJ6/find-3rd + compare_mongo_cmd find myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157 -3rd + local command=find + local uri=myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157 + local postfix=-3rd + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-04-02T14:38:14+0000] running db.test.find() in myApp + [[ false == true ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157 == *cfg* ]] + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.76xZvAw0Vw +++ mktemp ++ local LAST_ERR=/tmp/tmp.1v7n3x5Kej ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.76xZvAw0Vw ++ cat /tmp/tmp.1v7n3x5Kej ++ rm /tmp/tmp.76xZvAw0Vw /tmp/tmp.1v7n3x5Kej ++ return 0 + local client_container=psmdb-client-bb8b97679-nhg77 + kubectl_bin exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.78S7XlUXqN ++ mktemp + local LAST_ERR=/tmp/tmp.qol0KNxJp5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-nhg77 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@another-name-rs0-2.another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.78S7XlUXqN + cat /tmp/tmp.qol0KNxJp5 + rm /tmp/tmp.78S7XlUXqN /tmp/tmp.qol0KNxJp5 + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/init-deploy/compare/find-3rd.json /tmp/tmp.hoVuIlaYJ6/find-3rd + desc 'check number of connections with backup' + set +o xtrace ----------------------------------------------------------------------------------- check number of connections with backup ----------------------------------------------------------------------------------- + max_conn=50 + sleep 300 ++ run_mongo 'db.serverStatus().connections.current' clusterAdmin:clusterAdmin123456@another-name-rs0.init-deploy-6157 ++ egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|bye' ++ local 'command=db.serverStatus().connections.current' ++ local uri=clusterAdmin:clusterAdmin123456@another-name-rs0.init-deploy-6157 ++ local driver=mongodb+srv ++ local suffix=.svc.cluster.local ++ local mongo_flag= ++ local replica_set=rs0 ++ [[ clusterAdmin:clusterAdmin123456@another-name-rs0.init-deploy-6157 == *cfg* ]] +++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++++ mktemp egrep: warning: egrep is obsolescent; using grep -E +++ local LAST_OUT=/tmp/tmp.9WkHw9gq0S ++++ mktemp +++ local LAST_ERR=/tmp/tmp.aF1EdiMsHp +++ local exit_status=0 +++ local timeout=4 ++++ seq 0 2 +++ for i in $(seq 0 2) +++ set +e +++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 -a -n 1 ']' +++ break +++ cat /tmp/tmp.9WkHw9gq0S +++ cat /tmp/tmp.aF1EdiMsHp +++ rm /tmp/tmp.9WkHw9gq0S /tmp/tmp.aF1EdiMsHp +++ return 0 ++ local client_container=psmdb-client-bb8b97679-vtxsv ++ kubectl_bin exec psmdb-client-bb8b97679-vtxsv -- bash -c 'printf '\''db.serverStatus().connections.current\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' +++ mktemp ++ local LAST_OUT=/tmp/tmp.31f2832pxa +++ mktemp ++ local LAST_ERR=/tmp/tmp.dRmoRU50m0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl exec psmdb-client-bb8b97679-vtxsv -- bash -c 'printf '\''db.serverStatus().connections.current\n'\'' | mongo mongodb+srv://clusterAdmin:clusterAdmin123456@another-name-rs0.init-deploy-6157.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.31f2832pxa ++ cat /tmp/tmp.dRmoRU50m0 ++ rm /tmp/tmp.31f2832pxa /tmp/tmp.dRmoRU50m0 ++ return 0 + conn_count=38 + '[' 38 -gt 50 ']' + desc 'check if mongod log files exist in pod' + set +o xtrace ----------------------------------------------------------------------------------- check if mongod log files exist in pod ----------------------------------------------------------------------------------- ++ kubectl exec another-name-rs0-0 -c mongod -- ls /data/db/logs + log_files=$'mongod.full.log\nmongod.log' + echo $'mongod.full.log\nmongod.log' + grep -q mongod.log + echo $'mongod.full.log\nmongod.log' + grep -q mongod.full.log + echo 'found mongod.log and mongod.full.log in /data/db/logs' found mongod.log and mongod.full.log in /data/db/logs + desc 'delete custom RuntimeClass' + set +o xtrace ----------------------------------------------------------------------------------- delete custom RuntimeClass ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/container-rc.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.llTCvanobZ ++ mktemp + local LAST_ERR=/tmp/tmp.ZAmEHE6YXU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/e2e-tests/conf/container-rc.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.llTCvanobZ runtimeclass.node.k8s.io "container-rc" deleted + cat /tmp/tmp.ZAmEHE6YXU + rm /tmp/tmp.llTCvanobZ /tmp/tmp.ZAmEHE6YXU + return 0 + destroy init-deploy-6157 + local namespace=init-deploy-6157 + local ignore_logs=true + [[ 0 == 1 ]] + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_backups + desc 'Delete psmdb-backup' + set +o xtrace ----------------------------------------------------------------------------------- Delete psmdb-backup ----------------------------------------------------------------------------------- ++ kubectl_bin get psmdb-backup --no-headers ++ wc -l +++ mktemp ++ local LAST_OUT=/tmp/tmp.fmIV16Ifri +++ mktemp ++ local LAST_ERR=/tmp/tmp.WJ4uf9JBu7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb-backup --no-headers ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fmIV16Ifri ++ cat /tmp/tmp.WJ4uf9JBu7 No resources found in init-deploy-6157 namespace. ++ rm /tmp/tmp.fmIV16Ifri /tmp/tmp.WJ4uf9JBu7 ++ return 0 + '[' 0 '!=' 0 ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.yuKXbCfnTd ++ mktemp + local LAST_ERR=/tmp/tmp.ADHregyoTL + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.yuKXbCfnTd customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.ADHregyoTL + rm /tmp/tmp.yuKXbCfnTd /tmp/tmp.ADHregyoTL + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/crd.yaml ++ grep -v '\-\-\-' grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.nfwDqcEnbr ++ mktemp + local LAST_ERR=/tmp/tmp.fEmiHrkFZV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nfwDqcEnbr + cat /tmp/tmp.fEmiHrkFZV + rm /tmp/tmp.nfwDqcEnbr /tmp/tmp.fEmiHrkFZV + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.httSSOEBki ++ mktemp + local LAST_ERR=/tmp/tmp.O3cKrYNY4K + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.httSSOEBki + cat /tmp/tmp.O3cKrYNY4K + rm /tmp/tmp.httSSOEBki /tmp/tmp.O3cKrYNY4K + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.OkLLcuZKlI ++ mktemp + local LAST_ERR=/tmp/tmp.aR35Cr0POk + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.OkLLcuZKlI + cat /tmp/tmp.aR35Cr0POk + rm /tmp/tmp.OkLLcuZKlI /tmp/tmp.aR35Cr0POk + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.W1LUzlxFdH ++ mktemp + local LAST_ERR=/tmp/tmp.j6CIQPjDSh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2299/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.W1LUzlxFdH clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.j6CIQPjDSh + rm /tmp/tmp.W1LUzlxFdH /tmp/tmp.j6CIQPjDSh + return 0 + destroy_cert_manager + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.fCg5AlRwn1 ++ mktemp + local LAST_ERR=/tmp/tmp.nqa1t7KrPX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.fCg5AlRwn1 + cat /tmp/tmp.nqa1t7KrPX Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 0 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.fCg5AlRwn1 + cat /tmp/tmp.nqa1t7KrPX Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 4 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.fCg5AlRwn1 + cat /tmp/tmp.nqa1t7KrPX Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 8 + cat /tmp/tmp.fCg5AlRwn1 + cat /tmp/tmp.nqa1t7KrPX Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + rm /tmp/tmp.fCg5AlRwn1 /tmp/tmp.nqa1t7KrPX + return 1 + true + '[' -n '' ']' + '[' -n psmdb-operator ']' + rm -rf /tmp/tmp.hoVuIlaYJ6 + kubectl_bin delete --grace-period=0 --force=true namespace init-deploy-6157 + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.pJVhJtpYib + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- ++ mktemp + local LAST_OUT=/tmp/tmp.rXzpitR9OT + local LAST_ERR=/tmp/tmp.BVzNacFBBO ++ mktemp + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.q87zs3VuaY + local exit_status=0 + local timeout=4 + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace init-deploy-6157 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator