Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/logs/tls-issue-cert-manager-8-0.log WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 + main + create_infra tls-issue-cert-manager-7380 + local ns=tls-issue-cert-manager-7380 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-cert-manager-5654 some-name-tls-issue --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name-tls-issue patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.9S03PTMfQc ++ mktemp + local LAST_ERR=/tmp/tmp.7qd4hN6Ofv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9S03PTMfQc perconaxtradbcluster.pxc.percona.com "some-name-tls-issue" deleted + cat /tmp/tmp.7qd4hN6Ofv + rm /tmp/tmp.9S03PTMfQc /tmp/tmp.7qd4hN6Ofv + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.161MmiRjA5 ++ mktemp + local LAST_ERR=/tmp/tmp.BFsNLwEzZo + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.161MmiRjA5 No resources found + cat /tmp/tmp.BFsNLwEzZo + rm /tmp/tmp.161MmiRjA5 /tmp/tmp.BFsNLwEzZo + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.LAZwzF3n7p ++ mktemp + local LAST_ERR=/tmp/tmp.RQfE2w1UXs + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.LAZwzF3n7p No resources found + cat /tmp/tmp.RQfE2w1UXs + rm /tmp/tmp.LAZwzF3n7p /tmp/tmp.RQfE2w1UXs + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.mKcEaCILAn + awk '{print$1}' + local LAST_OUT=/tmp/tmp.Ls3WtIZtt2 ++ mktemp + local LAST_ERR=/tmp/tmp.1ISiKxSQ0B + local exit_status=0 ++ mktemp ++ seq 0 2 + local LAST_ERR=/tmp/tmp.jAHfEy6TWC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mKcEaCILAn + cat /tmp/tmp.jAHfEy6TWC + rm /tmp/tmp.mKcEaCILAn /tmp/tmp.jAHfEy6TWC + return 0 namespace "cert-manager" deleted namespace "tls-issue-cert-manager-5654" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ls3WtIZtt2 namespace "pxc-operator" deleted + cat /tmp/tmp.1ISiKxSQ0B + rm /tmp/tmp.Ls3WtIZtt2 /tmp/tmp.1ISiKxSQ0B + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.qNY30gxivL ++ mktemp + local LAST_ERR=/tmp/tmp.FRuAJvXUvz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.qNY30gxivL namespace/pxc-operator created + cat /tmp/tmp.FRuAJvXUvz + rm /tmp/tmp.qNY30gxivL /tmp/tmp.FRuAJvXUvz + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.hr43OctazC +++ mktemp ++ local LAST_ERR=/tmp/tmp.o4aDoW3rSW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hr43OctazC ++ cat /tmp/tmp.o4aDoW3rSW ++ rm /tmp/tmp.hr43OctazC /tmp/tmp.o4aDoW3rSW ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.FrCPKJ18vU ++ mktemp + local LAST_ERR=/tmp/tmp.qhmo54gvy0 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.FrCPKJ18vU Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1" modified. + cat /tmp/tmp.qhmo54gvy0 + rm /tmp/tmp.FrCPKJ18vU /tmp/tmp.qhmo54gvy0 + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.f4dhbNAAYC ++ mktemp + local LAST_ERR=/tmp/tmp.5iZdfZlIN0 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.f4dhbNAAYC customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.5iZdfZlIN0 + rm /tmp/tmp.f4dhbNAAYC /tmp/tmp.5iZdfZlIN0 + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + sed -e 's^namespace: .*^namespace: pxc-operator^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/deploy/cw-rbac.yaml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.EvHmv7hTyZ ++ mktemp + local LAST_ERR=/tmp/tmp.UVLjVWzJ2s + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.EvHmv7hTyZ clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.UVLjVWzJ2s + rm /tmp/tmp.EvHmv7hTyZ /tmp/tmp.UVLjVWzJ2s + return 0 + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/deploy/cw-operator.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1726-75d74a6e^' + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - ++ mktemp + local LAST_OUT=/tmp/tmp.ZjrrMtboH7 ++ mktemp + local LAST_ERR=/tmp/tmp.9d1kz8HuBC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ZjrrMtboH7 deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.9d1kz8HuBC + rm /tmp/tmp.ZjrrMtboH7 /tmp/tmp.9d1kz8HuBC + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.3cHaBRR4L6 ++ mktemp + local LAST_ERR=/tmp/tmp.HqoW0ly78p + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.3cHaBRR4L6 pod/percona-xtradb-cluster-operator-58867c4d5c-tglt4 condition met + cat /tmp/tmp.HqoW0ly78p + rm /tmp/tmp.3cHaBRR4L6 /tmp/tmp.HqoW0ly78p + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.KMfC0gQQJf +++ mktemp ++ local LAST_ERR=/tmp/tmp.02pDN3BsWo ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KMfC0gQQJf ++ cat /tmp/tmp.02pDN3BsWo ++ rm /tmp/tmp.KMfC0gQQJf /tmp/tmp.02pDN3BsWo ++ return 0 + wait_pod percona-xtradb-cluster-operator-58867c4d5c-tglt4 480 pxc-operator + local pod=percona-xtradb-cluster-operator-58867c4d5c-tglt4 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-58867c4d5c-tglt4 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-58867c4d5c-tglt4 condition met percona-xtradb-cluster-operator-58867c4d5c-tglt4.Ok + sleep 3 + create_namespace tls-issue-cert-manager-7380 + local namespace=tls-issue-cert-manager-7380 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces tls-issue-cert-manager-7380' + set +o xtrace + xargs kubectl delete ns ----------------------------------------------------------------------------------- cleaned up old namespaces tls-issue-cert-manager-7380 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace tls-issue-cert-manager-7380 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.mYtiTcEej6 + local LAST_OUT=/tmp/tmp.XURonZxPIY ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.WtvVkECTTu + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.dUaVh7snfw + local exit_status=0 + awk '{print$1}' ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-7380 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-7380 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mYtiTcEej6 + cat /tmp/tmp.WtvVkECTTu + rm /tmp/tmp.mYtiTcEej6 /tmp/tmp.WtvVkECTTu + return 0 Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-7380 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.XURonZxPIY + cat /tmp/tmp.dUaVh7snfw Error from server (NotFound): namespaces "tls-issue-cert-manager-7380" not found + rm /tmp/tmp.XURonZxPIY /tmp/tmp.dUaVh7snfw + return 1 + : + wait_for_delete namespace/tls-issue-cert-manager-7380 + local res=namespace/tls-issue-cert-manager-7380 + echo -n 'namespace/tls-issue-cert-manager-7380 - ' namespace/tls-issue-cert-manager-7380 - + set +o xtrace Error from server (NotFound): namespaces "tls-issue-cert-manager-7380" not found + desc 'create namespace tls-issue-cert-manager-7380' + set +o xtrace ----------------------------------------------------------------------------------- create namespace tls-issue-cert-manager-7380 ----------------------------------------------------------------------------------- + kubectl_bin create namespace tls-issue-cert-manager-7380 ++ mktemp + local LAST_OUT=/tmp/tmp.VlqQu1PBzP ++ mktemp + local LAST_ERR=/tmp/tmp.bVLeq35w5j + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace tls-issue-cert-manager-7380 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VlqQu1PBzP namespace/tls-issue-cert-manager-7380 created + cat /tmp/tmp.bVLeq35w5j + rm /tmp/tmp.VlqQu1PBzP /tmp/tmp.bVLeq35w5j + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.1MqeaDvH7n +++ mktemp ++ local LAST_ERR=/tmp/tmp.d4rtFhLZ7d ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1MqeaDvH7n ++ cat /tmp/tmp.d4rtFhLZ7d ++ rm /tmp/tmp.1MqeaDvH7n /tmp/tmp.d4rtFhLZ7d ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1 --namespace=tls-issue-cert-manager-7380 ++ mktemp + local LAST_OUT=/tmp/tmp.KFatkL1h9c ++ mktemp + local LAST_ERR=/tmp/tmp.9O35RYGyU3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1 --namespace=tls-issue-cert-manager-7380 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KFatkL1h9c Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1726-75d74a6e-1-cluster1" modified. + cat /tmp/tmp.9O35RYGyU3 + rm /tmp/tmp.KFatkL1h9c /tmp/tmp.9O35RYGyU3 + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.Pgs7OP8mXe ++ mktemp + local LAST_ERR=/tmp/tmp.LApVuvV1Ov + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Pgs7OP8mXe secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.LApVuvV1Ov + rm /tmp/tmp.Pgs7OP8mXe /tmp/tmp.LApVuvV1Ov + return 0 + cluster=some-name-tls-issue + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.xCdmGfWCHL ++ mktemp + local LAST_ERR=/tmp/tmp.ns8PTb8epl + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.xCdmGfWCHL namespace/cert-manager created + cat /tmp/tmp.ns8PTb8epl + rm /tmp/tmp.xCdmGfWCHL /tmp/tmp.ns8PTb8epl + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.efTWPrGizk ++ mktemp + local LAST_ERR=/tmp/tmp.BoyZDhreZc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.efTWPrGizk namespace/cert-manager labeled + cat /tmp/tmp.BoyZDhreZc + rm /tmp/tmp.efTWPrGizk /tmp/tmp.BoyZDhreZc + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.9m1YgKsyJ4 ++ mktemp + local LAST_ERR=/tmp/tmp.zWcstZhLwT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9m1YgKsyJ4 namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews configured role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection configured rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.zWcstZhLwT Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.9m1YgKsyJ4 /tmp/tmp.zWcstZhLwT + return 0 + '[' '' == 4.10 ']' + sleep 70 + desc 'create pxc cluster' + set +o xtrace ----------------------------------------------------------------------------------- create pxc cluster ----------------------------------------------------------------------------------- + spinup_pxc some-name-tls-issue /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml 3 10 /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/secrets_without_tls.yml /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/client.yml + local cluster=some-name-tls-issue + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.DudLEfSTcn ++ mktemp + local LAST_ERR=/tmp/tmp.qVf8xbWnTJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DudLEfSTcn secret/my-cluster-secrets created + cat /tmp/tmp.qVf8xbWnTJ + rm /tmp/tmp.DudLEfSTcn /tmp/tmp.qVf8xbWnTJ + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/client.yml + kubectl_bin apply -f - + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1726-75d74a6e#' ++ mktemp + local LAST_OUT=/tmp/tmp.087cwfGdQq + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/client.yml + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' ++ mktemp + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-7380~ + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.R3CWjG1cIC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.087cwfGdQq deployment.apps/pxc-client created + cat /tmp/tmp.R3CWjG1cIC + rm /tmp/tmp.087cwfGdQq /tmp/tmp.R3CWjG1cIC + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1726-75d74a6e#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.vrSxEiNDYY ++ mktemp + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-7380~ + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + local LAST_ERR=/tmp/tmp.uE0IYsg9e2 + local exit_status=0 + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vrSxEiNDYY perconaxtradbcluster.pxc.percona.com/some-name-tls-issue created + cat /tmp/tmp.uE0IYsg9e2 + rm /tmp/tmp.vrSxEiNDYY /tmp/tmp.uE0IYsg9e2 + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name-tls-issue ++ local target_cluster=some-name-tls-issue +++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.4LDCSpn2aq ++++ mktemp +++ local LAST_ERR=/tmp/tmp.d4tKZgh607 +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.4LDCSpn2aq +++ cat /tmp/tmp.d4tKZgh607 +++ rm /tmp/tmp.4LDCSpn2aq /tmp/tmp.d4tKZgh607 +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.HdwbA3Nd6L ++++ mktemp +++ local LAST_ERR=/tmp/tmp.xv0tlGHDp6 +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.HdwbA3Nd6L +++ cat /tmp/tmp.xv0tlGHDp6 +++ rm /tmp/tmp.HdwbA3Nd6L /tmp/tmp.xv0tlGHDp6 +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-tls-issue-proxysql ++ return + local proxy=some-name-tls-issue-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-7380 ++ mktemp + local LAST_OUT=/tmp/tmp.Op1xTYFZya ++ mktemp + local LAST_ERR=/tmp/tmp.NKKnzh9sld + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-7380 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-7380 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-7380 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.Op1xTYFZya + cat /tmp/tmp.NKKnzh9sld error: no matching resources found + rm /tmp/tmp.Op1xTYFZya /tmp/tmp.NKKnzh9sld + return 1 + true + wait_for_running some-name-tls-issue-proxysql 1 + local name=some-name-tls-issue-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-proxysql-0 480 + local pod=some-name-tls-issue-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-proxysql-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=proxysql + set +o xtrace pod/some-name-tls-issue-proxysql-0 condition met some-name-tls-issue-proxysql-0.Ok + wait_for_running some-name-tls-issue-pxc 3 + local name=some-name-tls-issue-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-0 480 + local pod=some-name-tls-issue-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-0 condition met some-name-tls-issue-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-1 480 + local pod=some-name-tls-issue-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-1 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-1 condition met some-name-tls-issue-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-2 480 + local pod=some-name-tls-issue-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-2 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-2 condition met some-name-tls-issue-pxc-2.Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BWhOXWHNXN +++ mktemp ++ local LAST_ERR=/tmp/tmp.EKNtmbPK00 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BWhOXWHNXN ++ cat /tmp/tmp.EKNtmbPK00 ++ rm /tmp/tmp.BWhOXWHNXN /tmp/tmp.EKNtmbPK00 ++ return 0 + client_pod=pxc-client-56fb78495-v8567 + wait_pod pxc-client-56fb78495-v8567 + local pod=pxc-client-56fb78495-v8567 + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-v8567 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-v8567 condition met pxc-client-56fb78495-v8567.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YBUzOZWZAH +++ mktemp ++ local LAST_ERR=/tmp/tmp.AkMFoJM8pQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YBUzOZWZAH ++ cat /tmp/tmp.AkMFoJM8pQ ++ rm /tmp/tmp.YBUzOZWZAH /tmp/tmp.AkMFoJM8pQ ++ return 0 + client_pod=pxc-client-56fb78495-v8567 + wait_pod pxc-client-56fb78495-v8567 + local pod=pxc-client-56fb78495-v8567 + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-v8567 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-v8567 condition met pxc-client-56fb78495-v8567.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.by13dG02bI +++ mktemp ++ local LAST_ERR=/tmp/tmp.iGUJk1KhCg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.by13dG02bI ++ cat /tmp/tmp.iGUJk1KhCg ++ rm /tmp/tmp.by13dG02bI /tmp/tmp.iGUJk1KhCg ++ return 0 + client_pod=pxc-client-56fb78495-v8567 + wait_pod pxc-client-56fb78495-v8567 + local pod=pxc-client-56fb78495-v8567 + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-v8567 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-v8567 condition met pxc-client-56fb78495-v8567.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.kHwHQmUiXR/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.kHwHQmUiXR/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VLGPPOvdb8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.NMDKzuY8E5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VLGPPOvdb8 ++ cat /tmp/tmp.NMDKzuY8E5 ++ rm /tmp/tmp.VLGPPOvdb8 /tmp/tmp.NMDKzuY8E5 ++ return 0 + client_pod=pxc-client-56fb78495-v8567 + wait_pod pxc-client-56fb78495-v8567 + local pod=pxc-client-56fb78495-v8567 + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-v8567 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-v8567 condition met pxc-client-56fb78495-v8567.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.kHwHQmUiXR/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.kHwHQmUiXR/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KI2OOSdAKO +++ mktemp ++ local LAST_ERR=/tmp/tmp.MfcWM7Gyn7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KI2OOSdAKO ++ cat /tmp/tmp.MfcWM7Gyn7 ++ rm /tmp/tmp.KI2OOSdAKO /tmp/tmp.MfcWM7Gyn7 ++ return 0 + client_pod=pxc-client-56fb78495-v8567 + wait_pod pxc-client-56fb78495-v8567 + local pod=pxc-client-56fb78495-v8567 + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-v8567 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-v8567 condition met pxc-client-56fb78495-v8567.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.kHwHQmUiXR/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.kHwHQmUiXR/select-1.sql ++ is_keyring_plugin_in_use some-name-tls-issue ++ local cluster=some-name-tls-issue ++ kubectl_bin exec -it some-name-tls-issue-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nYHLCtCkAK +++ mktemp ++ local LAST_ERR=/tmp/tmp.oUCfoPrFw6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-tls-issue-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nYHLCtCkAK ++ cat /tmp/tmp.oUCfoPrFw6 Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.nYHLCtCkAK /tmp/tmp.oUCfoPrFw6 ++ return 0 + '[' '' ']' + wait_cluster_consistency some-name-tls-issue 3 2 + local cluster_name=some-name-tls-issue + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4oBAHVR9Yx +++ mktemp ++ local LAST_ERR=/tmp/tmp.5XHFsCVdBZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4oBAHVR9Yx ++ cat /tmp/tmp.5XHFsCVdBZ ++ rm /tmp/tmp.4oBAHVR9Yx /tmp/tmp.5XHFsCVdBZ ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZJxqIBb7Ud +++ mktemp ++ local LAST_ERR=/tmp/tmp.LPta8S9Ogx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZJxqIBb7Ud ++ cat /tmp/tmp.LPta8S9Ogx ++ rm /tmp/tmp.ZJxqIBb7Ud /tmp/tmp.LPta8S9Ogx ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name-tls-issue +++ local cluster_name=some-name-tls-issue ++++ get_proxy some-name-tls-issue ++++ local target_cluster=some-name-tls-issue +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.7GH98aBa1I ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.vZwak2i9WT +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.7GH98aBa1I +++++ cat /tmp/tmp.vZwak2i9WT +++++ rm /tmp/tmp.7GH98aBa1I /tmp/tmp.vZwak2i9WT +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.2WJYaJQFnu ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.6EWgv9bscC +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.2WJYaJQFnu +++++ cat /tmp/tmp.6EWgv9bscC +++++ rm /tmp/tmp.2WJYaJQFnu /tmp/tmp.6EWgv9bscC +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-tls-issue-proxysql ++++ return +++ local cluster_proxy=some-name-tls-issue-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YQtQn1sXDv +++ mktemp ++ local LAST_ERR=/tmp/tmp.YdTf5bWEk8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YQtQn1sXDv ++ cat /tmp/tmp.YdTf5bWEk8 ++ rm /tmp/tmp.YQtQn1sXDv /tmp/tmp.YdTf5bWEk8 ++ return 0 + [[ 2 == \2 ]] + desc 'check if certificates issued with certmanager' + set +o xtrace ----------------------------------------------------------------------------------- check if certificates issued with certmanager ----------------------------------------------------------------------------------- + tlsSecretsShouldExist some-name-tls-issue-ssl + local secretName=some-name-tls-issue-ssl + checkTLSSecret some-name-tls-issue-ssl ca.crt + local secretName=some-name-tls-issue-ssl + local dataKey=ca.crt ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json ++ jq '.data["ca.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yJsDcY6Vay +++ mktemp ++ local LAST_ERR=/tmp/tmp.q2bT56Egoh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yJsDcY6Vay ++ cat /tmp/tmp.q2bT56Egoh ++ rm /tmp/tmp.yJsDcY6Vay /tmp/tmp.q2bT56Egoh ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issue-ssl tls.crt + local secretName=some-name-tls-issue-ssl + local dataKey=tls.crt ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json ++ jq '.data["tls.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Exn6Ooblme +++ mktemp ++ local LAST_ERR=/tmp/tmp.idUMeRMGVm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Exn6Ooblme ++ cat /tmp/tmp.idUMeRMGVm ++ rm /tmp/tmp.Exn6Ooblme /tmp/tmp.idUMeRMGVm ++ return 0 + local 'secretData="LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURuakNDQW9hZ0F3SUJBZ0lSQU5TODg4T01reHh4cGpWTk00R0pIT2t3RFFZSktvWklodmNOQVFFTEJRQXcKSVRFZk1CMEdBMVVFQXhNV2MyOXRaUzF1WVcxbExYUnNjeTFwYzNOMVpTMWpZVEFlRncweU5EQTJNVEF4TWpJeQpOVEZhRncweU5EQTVNRGd4TWpJeU5URmFNQ2N4SlRBakJnTlZCQU1USEhOdmJXVXRibUZ0WlMxMGJITXRhWE56CmRXVXRjSEp2ZUhsemNXd3dnZ0VpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZS9MMG0KdnlGUzFHUmp1WVIrS2V6YXJqWEtEcW9iTTVyK2daRjFOczJWbTJYTDA1SU9OUHZoSTZmblRDQ3ZYYUsyRGd4bQpNeDBzYUM4V1V0ZHhUMHVweUU4bnFzUGl0dlBVcG4zZ282Mmx1UlZzRTdjRjVsZk1jemRiNUtaeVNuN0xoZFZMCkZYekt1d2pRMDZUM3J1blpjSm9UTzBmQXQ5UDJJa3NOc1E0bHFKMk05KzR0dDJCN29adGN5ajV0VHNUeGhqcHgKR25CY05SS2pnMy9FTWpBYlBsVUl4M0tMbWEvOWlrQnNJMW1JN1M3bVRsNVBCWEFZdUhDdDUycVB0bER3UGNCWgorV0tWa08vSG82YkMxU05jN0ZXSjFuSHBFRzZkc1RXdGR3ZDFpODY2cWpXbGlxQjl1eks0NnpVNWNUV0t6cFJHCkF5R0ExaHRDRWNkWU9xelBBZ01CQUFHamdjb3dnY2N3RGdZRFZSMFBBUUgvQkFRREFnV2dNQXdHQTFVZEV3RUIKL3dRQ01BQXdId1lEVlIwakJCZ3dGb0FVRlhhV1M3NG9PbnNRSUxCaEFZYU4rT3pQSHVvd2dZVUdBMVVkRVFSKwpNSHlDRjNOdmJXVXRibUZ0WlMxMGJITXRhWE56ZFdVdGNIaGpnaHh6YjIxbExXNWhiV1V0ZEd4ekxXbHpjM1ZsCkxYQnliM2g1YzNGc2doa3FMbk52YldVdGJtRnRaUzEwYkhNdGFYTnpkV1V0Y0hoamdoNHFMbk52YldVdGJtRnQKWlMxMGJITXRhWE56ZFdVdGNISnZlSGx6Y1d5Q0NIUmxjM1F1WTI5dE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQgpBUUJjZ01KMVlZVVExZjlGY2RkZ0RJQ0JjcmJnU2xzZ3lQWktnbkQ3aE1JRkpHVEkxV1ZCcFdpWENjVVhhOGNRCmsyOUlrRDlrcmZYNUZzTEFBNE4wblhDUEFsQlNHTnRPU0tvblJiZ0JadllUdnNaUnAxTWNXenBUcmE3cG9tMXgKbkpWQkZPT1p0dUE5aHlOZEpDK3Z6Rm55MVI2WTNITWpyS3JhOG9vUlE3dXdpRFVCUzZIem0zdjhna3NyeXVxOQp5SVNmWkFVQVZSUWJ4QzVNdzQ2WGRWRlZ1U21zZEtIR3l5ZWw1dHA4UGpFdkhPcHRHb1JnNU80WEdBRlRjL0dTCmp1WFVMNGZoVjdxWVE5bE1HMWg0S2lFODZHTVRxUkV2NkJ4d2UrVXNpc25tN05wZW44YXBoSzJ6R3ZpT00yZzEKMDlsaXV1Uklmbk90U1VHS3V3Q0VvREpuCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issue-ssl tls.key + local secretName=some-name-tls-issue-ssl + local dataKey=tls.key ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json ++ jq '.data["tls.key"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sunO3mrgU9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.l1MpbjrG9F ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.sunO3mrgU9 ++ cat /tmp/tmp.l1MpbjrG9F ++ rm /tmp/tmp.sunO3mrgU9 /tmp/tmp.l1MpbjrG9F ++ return 0 + local 'secretData="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"' + '[' -z '"LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcFFJQkFBS0NBUUVBM3Z5OUpyOGhVdFJrWTdtRWZpbnMycTQxeWc2cUd6T2Evb0dSZFRiTmxadGx5OU9TCkRqVDc0U09uNTB3Z3IxMml0ZzRNWmpNZExHZ3ZGbExYY1U5THFjaFBKNnJENHJiejFLWjk0S090cGJrVmJCTzMKQmVaWHpITTNXK1NtY2twK3k0WFZTeFY4eXJzSTBOT2s5NjdwMlhDYUV6dEh3TGZUOWlKTERiRU9KYWlkalBmdQpMYmRnZTZHYlhNbytiVTdFOFlZNmNScHdYRFVTbzROL3hESXdHejVWQ01keWk1bXYvWXBBYkNOWmlPMHU1azVlClR3VndHTGh3cmVkcWo3WlE4RDNBV2ZsaWxaRHZ4Nk9td3RValhPeFZpZFp4NlJCdW5iRTFyWGNIZFl2T3VxbzEKcFlxZ2Zic3l1T3MxT1hFMWlzNlVSZ01oZ05ZYlFoSEhXRHFzendJREFRQUJBb0lCQURYUkY3R25SVnFoU2cxTApjKytqSExmMmZhTGpnU2lKZnVuWHlZeFppcXFGMDc2cXRFQmJoMExpQVI3d241N1RZWGJBMHp0RE1OSkwzcmxyCml2V2M1cXoyWEN3OXFZTXBGcFlIRExCUHNKUWpwRWp1UlNqV1cvQkxDbHhTUmQybG53NXRvWG02bU9DdzNVTFIKSWFwcGU2VHY2UytsQ2Y4NEhwN3p6ZHRqRlAvL1M0MDBtT21IV3RwWUFHRUc5cnhxSUtVSUhWQWhVNzNrTkNKSgpid1EwM0xBK2huUjJnRVhHMHU0YlNMb3lUMm1mMWdjRGM5dUJUQ1owQ2M3Q1M5dHptZU1iY0Q5SzJBRzhkZEg4CjVYRWFIY0h4SkpId0Z2T0x2WVRuWjNJYU9KRjRjVVRXcVZ6NDZWdXhaazUxSElMdU94UEFOdVNmTWZMTTh2NHAKYU9Xc3ZTa0NnWUVBOWx2WDRIQ2xCd0pRL3hWb1hMNDRXYzI5YjgxcVVIdHdFZ1dkd011bndFYVF5UjBGcXpyNAo1ZkdwUm40dk5kbnlQNTd5djdZRCtlaUpRbDRlZGtuZUpiaWlEYkdTN1JTcEFUSXpiUkt4bGFVNitQUW1ZUzA2CithbFZNQys1TXBNcElMRE9EYlJOdTFTeGZ0SW95bldPVmhDTC9SWkVpbUNXb2VSTWdwWEFYRlVDZ1lFQTU3YS8KUThkVUp1cWM4YWVsV0ZDUmxoZXVpS0h0L0hIN3VWQTdhSzE1NWJpd3ZXcEsrKzJqYW4yWGpBNmhmUUtlOGJGWQpzUzNMQVJ2dkJOVWR4VG9ONGJtdXhqOEVlQzVPUnhPamFYTktQUUJkbUd0M1h1WEdRZ3E2Z1NkSk9SK3RwMDBMCnAvVFRsdVUrQzZDR2hEVWZHUC94eUxjeVFaSk9YaVFnL1J0WENKTUNnWUVBNk9QVjVnUlczWk5oQW1NNGIwUWIKZlRtemRYZVlvMUN0bHp2Yjc2QVdpdnVxYjVTU0FWY1VhRHZWckNBcGZSejFseE1wby9Yck9GcU5OMEpHUmNoNgp5dW9KdUN4QUd3Tkc2U3lOMVBTeEVDaE00WC9jc0V6VHphUTROZjlIY2ZvUURTbFhBVG1McWlYY1RXbGF5bG5yCkhvMHg2U1VkMGpxUTY2WW9kZUlmSUtrQ2dZRUE0ci8xK1pqbEk5UXhVMVh3T3pWVTB1RkgzZE5BdGVyQkgvNkEKdEpZV2xKUWcrS3M4eDc0c1RiaXJoZGFIZDNNS0laQ2dMM3FWanZkTDlwbXJNV2IzVUs1SmR4MFIvWjJxNG1rNApYNmYvdlNSUGN5bXZQZ0Z5K3d2T3FUYk50QVhwQkxBanVPK2Y0NmxnQnpiR2pEZ0R2NDR2aUhDbDBIOGhDNFVsCmR5cTdCOXNDZ1lFQWwxV21oVXFKYTlTL1BVSHNaQUFHSTNmaUFhQXhINzBlK3lJd1AwN3lPNG1CWmYwSWVuUGEKYUcydkYzci8zM2JiVW8zdTJzUUIwVWY5dU8zOXN4eHA1MEUyaWNiVkgrM0RSV1Q5TkhrY3A0UndtUjA5S0dvVApqS0NBVFNibk94bTlxK3ZuZ0NNeUJKQTZiUmVCdXNmWDk0M0tYT2s1MmFXMzJBQXFoWWlvd1JRPQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo="' ']' + desc 'check if CA issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if CA issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-tls-issue-pxc-ca-issuer + local resource=issuer/some-name-tls-issue-pxc-ca-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer.yml + local new_result=/tmp/tmp.kHwHQmUiXR/issuer_some-name-tls-issue-pxc-ca-issuer.yml + desc 'compare issuer/some-name-tls-issue-pxc-ca-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare issuer/some-name-tls-issue-pxc-ca-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-eks.yml ']' + kubectl_bin get -o yaml issuer/some-name-tls-issue-pxc-ca-issuer + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-7380", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.WnWroJgi0d ++ mktemp + local LAST_ERR=/tmp/tmp.PiVfysS1AF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-tls-issue-pxc-ca-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WnWroJgi0d + cat /tmp/tmp.PiVfysS1AF + rm /tmp/tmp.WnWroJgi0d /tmp/tmp.PiVfysS1AF + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer.yml /tmp/tmp.kHwHQmUiXR/issuer_some-name-tls-issue-pxc-ca-issuer.yml + desc 'check if issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-tls-issue-pxc-issuer + local resource=issuer/some-name-tls-issue-pxc-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer.yml + local new_result=/tmp/tmp.kHwHQmUiXR/issuer_some-name-tls-issue-pxc-issuer.yml + desc 'compare issuer/some-name-tls-issue-pxc-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare issuer/some-name-tls-issue-pxc-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-eks.yml ']' + kubectl_bin get -o yaml issuer/some-name-tls-issue-pxc-issuer ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-7380", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.OBMuPgp7tO ++ mktemp + local LAST_ERR=/tmp/tmp.acw8sRu7kW + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-tls-issue-pxc-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OBMuPgp7tO + cat /tmp/tmp.acw8sRu7kW + rm /tmp/tmp.OBMuPgp7tO /tmp/tmp.acw8sRu7kW + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer.yml /tmp/tmp.kHwHQmUiXR/issuer_some-name-tls-issue-pxc-issuer.yml + desc 'check if certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-tls-issue-ssl + local resource=certificate/some-name-tls-issue-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl.yml + local new_result=/tmp/tmp.kHwHQmUiXR/certificate_some-name-tls-issue-ssl.yml + desc 'compare certificate/some-name-tls-issue-ssl-' + set +o xtrace ----------------------------------------------------------------------------------- compare certificate/some-name-tls-issue-ssl- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-eks.yml ']' + kubectl_bin get -o yaml certificate/some-name-tls-issue-ssl ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-7380", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.AwmueQxZh6 ++ mktemp + local LAST_ERR=/tmp/tmp.fF9VmPB8Qh + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-tls-issue-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.AwmueQxZh6 + cat /tmp/tmp.fF9VmPB8Qh + rm /tmp/tmp.AwmueQxZh6 /tmp/tmp.fF9VmPB8Qh + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl.yml /tmp/tmp.kHwHQmUiXR/certificate_some-name-tls-issue-ssl.yml + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml + '[' -z '' ']' + kubectl_bin apply -f - + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1726-75d74a6e#' + local LAST_OUT=/tmp/tmp.J4lJwN8zcM + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-7380~ + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1726/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml ++ mktemp + local LAST_ERR=/tmp/tmp.ExkE1IST11 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.J4lJwN8zcM perconaxtradbcluster.pxc.percona.com/some-name-tls-issue configured + cat /tmp/tmp.ExkE1IST11 + rm /tmp/tmp.J4lJwN8zcM /tmp/tmp.ExkE1IST11 + return 0 + wait_for_running some-name-tls-issue-haproxy 1 + local name=some-name-tls-issue-haproxy + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-haproxy-0 480 + local pod=some-name-tls-issue-haproxy-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-haproxy-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/some-name-tls-issue-haproxy-0 condition met some-name-tls-issue-haproxy-0Defaulted container "haproxy" out of: haproxy, pxc-monit, pxc-init (init) .Ok + wait_cluster_consistency some-name-tls-issue 3 2 + local cluster_name=some-name-tls-issue + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oLjkZUdxEx +++ mktemp ++ local LAST_ERR=/tmp/tmp.KoM3pyPhub ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oLjkZUdxEx ++ cat /tmp/tmp.KoM3pyPhub ++ rm /tmp/tmp.oLjkZUdxEx /tmp/tmp.KoM3pyPhub ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FwwiN27Zk2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WJF81d0x1T ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FwwiN27Zk2 ++ cat /tmp/tmp.WJF81d0x1T ++ rm /tmp/tmp.FwwiN27Zk2 /tmp/tmp.WJF81d0x1T ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2vYmyOh1uJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZlX7SmaiSs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2vYmyOh1uJ ++ cat /tmp/tmp.ZlX7SmaiSs ++ rm /tmp/tmp.2vYmyOh1uJ /tmp/tmp.ZlX7SmaiSs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yww75vA8Vn +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q0EKQRlElt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yww75vA8Vn ++ cat /tmp/tmp.Q0EKQRlElt ++ rm /tmp/tmp.yww75vA8Vn /tmp/tmp.Q0EKQRlElt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1GxRmOYuXV +++ mktemp ++ local LAST_ERR=/tmp/tmp.CkVM76Bw9V ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1GxRmOYuXV ++ cat /tmp/tmp.CkVM76Bw9V ++ rm /tmp/tmp.1GxRmOYuXV /tmp/tmp.CkVM76Bw9V ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.69J7LooHQs +++ mktemp ++ local LAST_ERR=/tmp/tmp.zec5L885VY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.69J7LooHQs ++ cat /tmp/tmp.zec5L885VY ++ rm /tmp/tmp.69J7LooHQs /tmp/tmp.zec5L885VY ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uc931gneep +++ mktemp ++ local LAST_ERR=/tmp/tmp.CM2TbIgxsa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uc931gneep ++ cat /tmp/tmp.CM2TbIgxsa ++ rm /tmp/tmp.uc931gneep /tmp/tmp.CM2TbIgxsa ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rPCKJUOUff +++ mktemp ++ local LAST_ERR=/tmp/tmp.NIdr2jbdiG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rPCKJUOUff ++ cat /tmp/tmp.NIdr2jbdiG ++ rm /tmp/tmp.rPCKJUOUff /tmp/tmp.NIdr2jbdiG ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name-tls-issue +++ local cluster_name=some-name-tls-issue ++++ get_proxy some-name-tls-issue ++++ local target_cluster=some-name-tls-issue +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.6O8hGe7RAk ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.0SCiJTCZUw +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.6O8hGe7RAk +++++ cat /tmp/tmp.0SCiJTCZUw +++++ rm /tmp/tmp.6O8hGe7RAk /tmp/tmp.0SCiJTCZUw +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-tls-issue-haproxy ++++ return +++ local cluster_proxy=some-name-tls-issue-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uRNaF8xran +++ mktemp ++ local LAST_ERR=/tmp/tmp.49rHC1pt0X ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uRNaF8xran ++ cat /tmp/tmp.49rHC1pt0X ++ rm /tmp/tmp.uRNaF8xran /tmp/tmp.49rHC1pt0X ++ return 0 + [[ 2 == \2 ]] + desc 'check ssl-internal certificate using PXC' + set +o xtrace ----------------------------------------------------------------------------------- check ssl-internal certificate using PXC ----------------------------------------------------------------------------------- + check_verify_identity some-name-tls-issue-pxc + local host=some-name-tls-issue-pxc + local command=exit + local 'args=--ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' + kubectl_bin exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' ++ mktemp + local LAST_OUT=/tmp/tmp.NB5EqIeOPo ++ mktemp + local LAST_ERR=/tmp/tmp.5sVrSjrHaN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NB5EqIeOPo + cat /tmp/tmp.5sVrSjrHaN Defaulted container "pxc" out of: pxc, pxc-init (init) mysql: [Warning] Using a password on the command line interface can be insecure. + rm /tmp/tmp.NB5EqIeOPo /tmp/tmp.5sVrSjrHaN + return 0 + desc 'check ssl-internal certificate using HAProxy' + set +o xtrace ----------------------------------------------------------------------------------- check ssl-internal certificate using HAProxy ----------------------------------------------------------------------------------- + check_verify_identity some-name-tls-issue-haproxy + local host=some-name-tls-issue-haproxy + local command=exit + local 'args=--ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' + kubectl_bin exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' ++ mktemp + local LAST_OUT=/tmp/tmp.CpzZvX2Gzw ++ mktemp + local LAST_ERR=/tmp/tmp.qagK9kaHM8 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CpzZvX2Gzw + cat /tmp/tmp.qagK9kaHM8 Defaulted container "pxc" out of: pxc, pxc-init (init) mysql: [Warning] Using a password on the command line interface can be insecure. + rm /tmp/tmp.CpzZvX2Gzw /tmp/tmp.qagK9kaHM8 + return 0 + destroy tls-issue-cert-manager-7380 + local namespace=tls-issue-cert-manager-7380 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info + grep -v 'the object has been modified' + grep -v 'get backup status: Job.batch' + tee /tmp/tmp.kHwHQmUiXR/operator.log + sort -u + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.C7t4DqZa5z +++ mktemp ++ local LAST_ERR=/tmp/tmp.uPIxHsfLQz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.C7t4DqZa5z ++ cat /tmp/tmp.uPIxHsfLQz ++ rm /tmp/tmp.C7t4DqZa5z /tmp/tmp.uPIxHsfLQz ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-58867c4d5c-tglt4 ++ mktemp + local LAST_OUT=/tmp/tmp.SYu8O6ojJz ++ mktemp + local LAST_ERR=/tmp/tmp.xefUE52lc5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-58867c4d5c-tglt4 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.SYu8O6ojJz + cat /tmp/tmp.xefUE52lc5 + rm /tmp/tmp.SYu8O6ojJz /tmp/tmp.xefUE52lc5 + return 0 2024-06-10T12:20:49.171Z INFO setup Manager starting up {"gitCommit": "75d74a6ea09a77205fd1516a16b298cf30936045", "gitBranch": "PR-1726-75d74a6e", "buildTime": "2024-06-10T10:17:46Z", "goVersion": "go1.22.4", "os": "linux", "arch": "amd64"} 2024-06-10T12:20:49.171Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.26.15-gke.1390000"} 2024-06-10T12:20:49.172Z INFO setup Registering Components. 2024-06-10T12:20:53.607Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-06-10T12:20:53.611Z INFO setup Starting the Cmd. 2024-06-10T12:20:53.612Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-06-10T12:20:53.612Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-06-10T12:20:53.612Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-06-10T12:20:53.612Z INFO controller-runtime.metrics Starting metrics server 2024-06-10T12:20:53.612Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-06-10T12:20:53.612Z INFO controller-runtime.webhook Starting webhook server 2024-06-10T12:20:53.612Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-06-10T12:20:53.713Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-06-10T12:20:53.733Z DEBUG events percona-xtradb-cluster-operator-58867c4d5c-tglt4_44e845b2-4f1b-415c-bc2f-a2a82a621718 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"fc0903aa-cd05-4fd1-a8db-8299cb1de531","apiVersion":"coordination.k8s.io/v1","resourceVersion":"66126"}, "reason": "LeaderElection"} 2024-06-10T12:20:53.733Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-06-10T12:20:53.733Z INFO Starting Controller {"controller": "pxc-controller"} 2024-06-10T12:20:53.733Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-06-10T12:20:53.733Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: unknown type"} 2024-06-10T12:20:53.733Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: unknown type"} 2024-06-10T12:20:53.733Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: unknown type"} 2024-06-10T12:20:53.733Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-06-10T12:20:53.840Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-06-10T12:20:53.840Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-06-10T12:20:53.843Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-06-10T12:22:46.888Z INFO Set CR version {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "52c859c0-df58-444d-9a3c-b5d687376163", "version": "1.15.0"} 2024-06-10T12:24:07.734Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71", "user": "operator"} 2024-06-10T12:24:07.776Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71", "user": "monitor"} 2024-06-10T12:24:07.873Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71"} 2024-06-10T12:24:07.923Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71"} 2024-06-10T12:24:07.964Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71", "user": "xtrabackup"} 2024-06-10T12:24:08.031Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71"} 2024-06-10T12:24:08.071Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71", "user": "replication"} 2024-06-10T12:24:08.184Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "3794d019-57d2-4bfd-92e8-0dd445fb9c71", "err": "get primary pxc pod: not found"} 2024-06-10T12:24:12.836Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "ebde22b2-107a-4a00-a3d3-032ee18c9210", "err": "get primary pxc pod: not found"} 2024-06-10T12:24:18.045Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "d2ebaa3b-08f1-4318-a3d1-63a0abd2f659", "err": "get primary pxc pod: not found"} 2024-06-10T12:24:23.311Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "9b041cfb-2550-473f-a4e3-0b8a3142a192", "err": "get primary pxc pod: not found"} 2024-06-10T12:26:37.578Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "ab7ed66c-c268-4a44-97da-bb1218d823d9", "user": "root"} 2024-06-10T12:26:37.896Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "ab7ed66c-c268-4a44-97da-bb1218d823d9", "new version": "8.0.36-28.1"} 2024-06-10T12:26:41.083Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "ab7ed66c-c268-4a44-97da-bb1218d823d9"} 2024-06-10T12:26:45.882Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "9106c6d4-3c85-4dd3-bb1e-79ce859ee2c6"} 2024-06-10T12:26:51.361Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "302915d1-a79e-44c0-9a56-b23c30178388"} 2024-06-10T12:26:57.668Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "06fb1671-0796-46dc-ad2c-092d96d7760d"} 2024-06-10T12:27:03.072Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "d3f25a29-24f9-4d77-b87f-78a0384cd0a5"} 2024-06-10T12:27:08.468Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "79b281d0-0c65-40d4-bcb4-95d93ffdba38"} 2024-06-10T12:27:13.980Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "09cc4f04-ada7-4183-b9cb-2ca73e333991"} 2024-06-10T12:27:19.672Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "21e37667-cfd8-4b92-981e-828eb8ad2ed4"} 2024-06-10T12:27:24.929Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "fb3273e8-09fb-42bf-9d3b-0da55c703be3"} 2024-06-10T12:27:30.260Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "1e0163d1-8d15-4fbd-9fba-a934852b350a"} 2024-06-10T12:27:35.865Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "e9398c31-0b6a-4b2e-97ee-48c08a7f8c3f"} 2024-06-10T12:27:41.174Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "fb24f25d-1fa5-4508-8259-46b3ed098480"} 2024-06-10T12:27:46.730Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "595f8b70-ddfa-4b09-8325-7dbdeb68ce49"} 2024-06-10T12:27:52.829Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "b33099b8-91a0-41d8-9505-c8d8fe1abca1"} 2024-06-10T12:27:58.031Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "9b812a12-42b5-4ab6-9e67-5aa6c83449e1"} 2024-06-10T12:28:01.420Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: b71e6dc5-39eb-47b3-a619-3effad2678db 2024-06-10T12:28:02.122Z ERROR sync users {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "0346d868-656c-4fcb-bf2d-78e1850b5d12", "error": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / ", "errorVerbose": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-06-10T12:28:04.083Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "c9f1d3b7-46df-4ddf-b5f2-47f05350fff6", "err": "get primary pxc pod: failed to get proxy connection: dial tcp 10.56.75.117:3306: connect: connection refused"} 2024-06-10T12:28:58.567Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "ceb8ad8d-560d-4c87-ad87-73edd7eea1d9", "err": "failed to ensure cluster readonly status: connect to pod some-name-tls-issue-pxc-1: dial tcp 10.14.128.34:33062: connect: connection refused"} 2024-06-10T12:29:57.347Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-7380", "name": "some-name-tls-issue", "reconcileID": "e7f525f8-fc70-4bcf-8da6-8582aaefc8f9", "err": "failed to ensure cluster readonly status: connect to pod some-name-tls-issue-pxc-0: dial tcp: lookup some-name-tls-issue-pxc-0.some-name-tls-issue-pxc.tls-issue-cert-manager-7380 on 10.56.64.10:53: no such host"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1248 [mysql] 2024/06/10 12:29:42 packets.go:37: unexpected EOF [mysql] 2024/06/10 12:29:57 packets.go:37: read tcp 10.14.130.51:34678->10.56.75.117:3306: i/o timeout + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-cert-manager-7380 some-name-tls-issue --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name-tls-issue patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.V0a3mBiRsf ++ mktemp + local LAST_ERR=/tmp/tmp.2fg1U0qjmz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.V0a3mBiRsf perconaxtradbcluster.pxc.percona.com "some-name-tls-issue" deleted + cat /tmp/tmp.2fg1U0qjmz + rm /tmp/tmp.V0a3mBiRsf /tmp/tmp.2fg1U0qjmz + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.ngxsTC18Qw ++ mktemp + local LAST_ERR=/tmp/tmp.F2x4wEB5UQ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ngxsTC18Qw No resources found + cat /tmp/tmp.F2x4wEB5UQ + rm /tmp/tmp.ngxsTC18Qw /tmp/tmp.F2x4wEB5UQ + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.v8OIfdiA8Q ++ mktemp + local LAST_ERR=/tmp/tmp.CdzrrEyt7p + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.v8OIfdiA8Q No resources found + cat /tmp/tmp.CdzrrEyt7p + rm /tmp/tmp.v8OIfdiA8Q /tmp/tmp.CdzrrEyt7p + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.8f7AcV2XLK ++ mktemp + local LAST_ERR=/tmp/tmp.2B3ICdunH9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8f7AcV2XLK validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.2B3ICdunH9 + rm /tmp/tmp.8f7AcV2XLK /tmp/tmp.2B3ICdunH9 + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + rm -rf /tmp/tmp.kHwHQmUiXR + kubectl_bin delete --grace-period=0 --force=true namespace tls-issue-cert-manager-7380 + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + desc 'test passed' + set +o xtrace + local LAST_OUT=/tmp/tmp.ZCWmEgmb5a ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.ldOyWeZv2t ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.uuZV86MGF2 + local exit_status=0 + local LAST_ERR=/tmp/tmp.NcalTSV3WF + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + for i in '$(seq 0 2)' + set +e + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + kubectl delete --grace-period=0 --force=true namespace tls-issue-cert-manager-7380