Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/logs/tls-issue-cert-manager-8-0.log WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 + main + create_infra tls-issue-cert-manager-26476 + local ns=tls-issue-cert-manager-26476 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE + kubectl patch pxc -n tls-issue-cert-manager-4622 some-name-tls-issue --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name-tls-issue patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.WCdOma0d1J ++ mktemp + local LAST_ERR=/tmp/tmp.QnBG4TMIIH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WCdOma0d1J perconaxtradbcluster.pxc.percona.com "some-name-tls-issue" deleted + cat /tmp/tmp.QnBG4TMIIH + rm /tmp/tmp.WCdOma0d1J /tmp/tmp.QnBG4TMIIH + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.S0VfsDXEan ++ mktemp + local LAST_ERR=/tmp/tmp.Xd3fuQhzJv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.S0VfsDXEan No resources found + cat /tmp/tmp.Xd3fuQhzJv + rm /tmp/tmp.S0VfsDXEan /tmp/tmp.Xd3fuQhzJv + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.X1e3Yz8EaG ++ mktemp + local LAST_ERR=/tmp/tmp.0OiVrBjaUt + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.X1e3Yz8EaG No resources found + cat /tmp/tmp.0OiVrBjaUt + rm /tmp/tmp.X1e3Yz8EaG /tmp/tmp.0OiVrBjaUt + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ awk '-F ' '{print $2}' ++ tail -n1 ++ helm list --all-namespaces --filter chaos-mesh ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ awk '{print $1}' ++ grep chaos-mesh ++ awk '{print $1}' ++ grep chaos-mesh.org ++ kubectl get crd + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get clusterrole + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator ++ mktemp + kubectl_bin get ns ++ mktemp + local LAST_OUT=/tmp/tmp.FBjy8pMbmd ++ mktemp + xargs kubectl delete ns + local LAST_ERR=/tmp/tmp.KxYw0cMe1P + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + awk '{print$1}' + local LAST_OUT=/tmp/tmp.lzbQpojtXt ++ mktemp + local LAST_ERR=/tmp/tmp.l7ZQM0iGKj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.FBjy8pMbmd + cat /tmp/tmp.KxYw0cMe1P + rm /tmp/tmp.FBjy8pMbmd /tmp/tmp.KxYw0cMe1P + return 0 namespace "cert-manager" deleted namespace "tls-issue-cert-manager-4622" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.lzbQpojtXt namespace "pxc-operator" deleted + cat /tmp/tmp.l7ZQM0iGKj + rm /tmp/tmp.lzbQpojtXt /tmp/tmp.l7ZQM0iGKj + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.DJT89U3zFL ++ mktemp + local LAST_ERR=/tmp/tmp.XicfUHHibw + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DJT89U3zFL namespace/pxc-operator created + cat /tmp/tmp.XicfUHHibw + rm /tmp/tmp.DJT89U3zFL /tmp/tmp.XicfUHHibw + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.96ULaq8MEq +++ mktemp ++ local LAST_ERR=/tmp/tmp.8XiiI5TfIz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.96ULaq8MEq ++ cat /tmp/tmp.8XiiI5TfIz ++ rm /tmp/tmp.96ULaq8MEq /tmp/tmp.8XiiI5TfIz ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.PMJRz2Irn6 ++ mktemp + local LAST_ERR=/tmp/tmp.xky1XoHCZD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PMJRz2Irn6 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7" modified. + cat /tmp/tmp.xky1XoHCZD + rm /tmp/tmp.PMJRz2Irn6 /tmp/tmp.xky1XoHCZD + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.MUDL9CvAH2 ++ mktemp + local LAST_ERR=/tmp/tmp.63Yeh7wlIF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.MUDL9CvAH2 customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.63Yeh7wlIF + rm /tmp/tmp.MUDL9CvAH2 /tmp/tmp.63Yeh7wlIF + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + kubectl_bin apply -f - + sed -e 's^namespace: .*^namespace: pxc-operator^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/deploy/cw-rbac.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.2LEn8BFnQB ++ mktemp + local LAST_ERR=/tmp/tmp.WLMZcEnrmX + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.2LEn8BFnQB clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.WLMZcEnrmX + rm /tmp/tmp.2LEn8BFnQB /tmp/tmp.WLMZcEnrmX + return 0 + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/deploy/cw-operator.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1743-51af0517^' + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.D7isXbsjYf ++ mktemp + local LAST_ERR=/tmp/tmp.WPeOCMD2DI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.D7isXbsjYf deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.WPeOCMD2DI + rm /tmp/tmp.D7isXbsjYf /tmp/tmp.WPeOCMD2DI + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.P7pp7TqTHG ++ mktemp + local LAST_ERR=/tmp/tmp.raHHySeEzS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.P7pp7TqTHG pod/percona-xtradb-cluster-operator-675fc7d9f5-gxq52 condition met + cat /tmp/tmp.raHHySeEzS + rm /tmp/tmp.P7pp7TqTHG /tmp/tmp.raHHySeEzS + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.OjkK7paiBr +++ mktemp ++ local LAST_ERR=/tmp/tmp.w8EENWOcaJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OjkK7paiBr ++ cat /tmp/tmp.w8EENWOcaJ ++ rm /tmp/tmp.OjkK7paiBr /tmp/tmp.w8EENWOcaJ ++ return 0 + wait_pod percona-xtradb-cluster-operator-675fc7d9f5-gxq52 480 pxc-operator + local pod=percona-xtradb-cluster-operator-675fc7d9f5-gxq52 + local max_retry=480 + local ns=pxc-operator ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' ++ echo percona-xtradb-cluster-operator-675fc7d9f5-gxq52 + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-675fc7d9f5-gxq52 condition met percona-xtradb-cluster-operator-675fc7d9f5-gxq52.Ok + sleep 3 + create_namespace tls-issue-cert-manager-26476 + local namespace=tls-issue-cert-manager-26476 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 + local chaos_mesh_ns= + '[' -n '' ']' ++ grep chaos-mesh ++ kubectl get MutatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl api-resources ++ awk '{print $1}' ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get clusterrole ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces tls-issue-cert-manager-26476' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces tls-issue-cert-manager-26476 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace tls-issue-cert-manager-26476 + awk '{print$1}' + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' ++ mktemp + kubectl_bin get ns + local LAST_OUT=/tmp/tmp.ZPWxwE3hJ4 + xargs kubectl delete ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.J45uuzAjOr + local LAST_ERR=/tmp/tmp.2uBRCNKtLq + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-26476 ++ mktemp + local LAST_ERR=/tmp/tmp.I03znFUEPx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.J45uuzAjOr + cat /tmp/tmp.I03znFUEPx + rm /tmp/tmp.J45uuzAjOr /tmp/tmp.I03znFUEPx + return 0 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-26476 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-26476 Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.ZPWxwE3hJ4 + cat /tmp/tmp.2uBRCNKtLq Error from server (NotFound): namespaces "tls-issue-cert-manager-26476" not found + rm /tmp/tmp.ZPWxwE3hJ4 /tmp/tmp.2uBRCNKtLq + return 1 + : + wait_for_delete namespace/tls-issue-cert-manager-26476 + local res=namespace/tls-issue-cert-manager-26476 + echo -n 'namespace/tls-issue-cert-manager-26476 - ' namespace/tls-issue-cert-manager-26476 - + set +o xtrace Error from server (NotFound): namespaces "tls-issue-cert-manager-26476" not found + desc 'create namespace tls-issue-cert-manager-26476' + set +o xtrace ----------------------------------------------------------------------------------- create namespace tls-issue-cert-manager-26476 ----------------------------------------------------------------------------------- + kubectl_bin create namespace tls-issue-cert-manager-26476 ++ mktemp + local LAST_OUT=/tmp/tmp.F8Ht0tDfue ++ mktemp + local LAST_ERR=/tmp/tmp.9abdw2GKDE + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace tls-issue-cert-manager-26476 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.F8Ht0tDfue namespace/tls-issue-cert-manager-26476 created + cat /tmp/tmp.9abdw2GKDE + rm /tmp/tmp.F8Ht0tDfue /tmp/tmp.9abdw2GKDE + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.gFVOs1u3K3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.UwhjcDLR6v ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gFVOs1u3K3 ++ cat /tmp/tmp.UwhjcDLR6v ++ rm /tmp/tmp.gFVOs1u3K3 /tmp/tmp.UwhjcDLR6v ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7 --namespace=tls-issue-cert-manager-26476 ++ mktemp + local LAST_OUT=/tmp/tmp.NXVSv69PmD ++ mktemp + local LAST_ERR=/tmp/tmp.PsUlgT4ezV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7 --namespace=tls-issue-cert-manager-26476 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NXVSv69PmD Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1743-51af0517-14-cluster7" modified. + cat /tmp/tmp.PsUlgT4ezV + rm /tmp/tmp.NXVSv69PmD /tmp/tmp.PsUlgT4ezV + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.PaMpOw95Tu ++ mktemp + local LAST_ERR=/tmp/tmp.vVUO0RYaO3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PaMpOw95Tu secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.vVUO0RYaO3 + rm /tmp/tmp.PaMpOw95Tu /tmp/tmp.vVUO0RYaO3 + return 0 + cluster=some-name-tls-issue + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.fSr9aUUL2Y ++ mktemp + local LAST_ERR=/tmp/tmp.Ju906Id5AP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.fSr9aUUL2Y namespace/cert-manager created + cat /tmp/tmp.Ju906Id5AP + rm /tmp/tmp.fSr9aUUL2Y /tmp/tmp.Ju906Id5AP + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.6rL7olXLRW ++ mktemp + local LAST_ERR=/tmp/tmp.dk4zVe34oS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6rL7olXLRW namespace/cert-manager labeled + cat /tmp/tmp.dk4zVe34oS + rm /tmp/tmp.6rL7olXLRW /tmp/tmp.dk4zVe34oS + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.GSrwt4nrQm ++ mktemp + local LAST_ERR=/tmp/tmp.RAW9UaOdw1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.GSrwt4nrQm namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews configured role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection configured rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.RAW9UaOdw1 Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.GSrwt4nrQm /tmp/tmp.RAW9UaOdw1 + return 0 + '[' '' == 4.10 ']' + sleep 70 + desc 'create pxc cluster' + set +o xtrace ----------------------------------------------------------------------------------- create pxc cluster ----------------------------------------------------------------------------------- + spinup_pxc some-name-tls-issue /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml 3 10 /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/secrets_without_tls.yml /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/client.yml + local cluster=some-name-tls-issue + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.A4Q9gnTl0g ++ mktemp + local LAST_ERR=/tmp/tmp.TlPfF9eHh0 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.A4Q9gnTl0g secret/my-cluster-secrets created + cat /tmp/tmp.TlPfF9eHh0 + rm /tmp/tmp.A4Q9gnTl0g /tmp/tmp.TlPfF9eHh0 + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/client.yml ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + local LAST_OUT=/tmp/tmp.bYLmlx8HcM + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1743-51af0517#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' ++ mktemp + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + local LAST_ERR=/tmp/tmp.lrx9nmehyN + local exit_status=0 ++ seq 0 2 + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + for i in '$(seq 0 2)' + set +e + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-26476~ + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.bYLmlx8HcM deployment.apps/pxc-client created + cat /tmp/tmp.lrx9nmehyN + rm /tmp/tmp.bYLmlx8HcM /tmp/tmp.lrx9nmehyN + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-26476~ + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1743-51af0517#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' ++ mktemp + local LAST_OUT=/tmp/tmp.5PfyUoKPPZ ++ mktemp + local LAST_ERR=/tmp/tmp.1ky2lwcVQX + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.5PfyUoKPPZ perconaxtradbcluster.pxc.percona.com/some-name-tls-issue created + cat /tmp/tmp.1ky2lwcVQX + rm /tmp/tmp.5PfyUoKPPZ /tmp/tmp.1ky2lwcVQX + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name-tls-issue ++ local target_cluster=some-name-tls-issue +++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.2GXCnXa4Ub ++++ mktemp +++ local LAST_ERR=/tmp/tmp.2h2sf1xZ1g +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.2GXCnXa4Ub +++ cat /tmp/tmp.2h2sf1xZ1g +++ rm /tmp/tmp.2GXCnXa4Ub /tmp/tmp.2h2sf1xZ1g +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.VwKD8u7qz0 ++++ mktemp +++ local LAST_ERR=/tmp/tmp.qa9kJ5V2PG +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.VwKD8u7qz0 +++ cat /tmp/tmp.qa9kJ5V2PG +++ rm /tmp/tmp.VwKD8u7qz0 /tmp/tmp.qa9kJ5V2PG +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-tls-issue-proxysql ++ return + local proxy=some-name-tls-issue-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-26476 ++ mktemp + local LAST_OUT=/tmp/tmp.80Ut20UfNN ++ mktemp + local LAST_ERR=/tmp/tmp.ohVJmJBsm3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-26476 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-26476 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-26476 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.80Ut20UfNN + cat /tmp/tmp.ohVJmJBsm3 error: no matching resources found + rm /tmp/tmp.80Ut20UfNN /tmp/tmp.ohVJmJBsm3 + return 1 + true + wait_for_running some-name-tls-issue-proxysql 1 + local name=some-name-tls-issue-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-proxysql-0 480 + local pod=some-name-tls-issue-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/some-name-tls-issue-proxysql-0 condition met some-name-tls-issue-proxysql-0.Ok + wait_for_running some-name-tls-issue-pxc 3 + local name=some-name-tls-issue-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-0 480 + local pod=some-name-tls-issue-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-0 condition met some-name-tls-issue-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-1 480 + local pod=some-name-tls-issue-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-1 condition met some-name-tls-issue-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-pxc-2 480 + local pod=some-name-tls-issue-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-tls-issue-pxc-2 condition met some-name-tls-issue-pxc-2.Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J2lwoN3c8K +++ mktemp ++ local LAST_ERR=/tmp/tmp.CtS8StRoqx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.J2lwoN3c8K ++ cat /tmp/tmp.CtS8StRoqx ++ rm /tmp/tmp.J2lwoN3c8K /tmp/tmp.CtS8StRoqx ++ return 0 + client_pod=pxc-client-56fb78495-c2kwl + wait_pod pxc-client-56fb78495-c2kwl + local pod=pxc-client-56fb78495-c2kwl + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-c2kwl ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-56fb78495-c2kwl condition met pxc-client-56fb78495-c2kwl.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-tls-issue-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w7gj8vcGZP +++ mktemp ++ local LAST_ERR=/tmp/tmp.87B6D8KFMW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.w7gj8vcGZP ++ cat /tmp/tmp.87B6D8KFMW ++ rm /tmp/tmp.w7gj8vcGZP /tmp/tmp.87B6D8KFMW ++ return 0 + client_pod=pxc-client-56fb78495-c2kwl + wait_pod pxc-client-56fb78495-c2kwl + local pod=pxc-client-56fb78495-c2kwl + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-c2kwl ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-c2kwl condition met pxc-client-56fb78495-c2kwl.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-0.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rwnAM4amq2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.YlviEEjzPV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rwnAM4amq2 ++ cat /tmp/tmp.YlviEEjzPV ++ rm /tmp/tmp.rwnAM4amq2 /tmp/tmp.YlviEEjzPV ++ return 0 + client_pod=pxc-client-56fb78495-c2kwl + wait_pod pxc-client-56fb78495-c2kwl + local pod=pxc-client-56fb78495-c2kwl + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-c2kwl ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-c2kwl condition met pxc-client-56fb78495-c2kwl.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.DXqsn8c4E5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.DXqsn8c4E5/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-1.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WZUsEPTLpj +++ mktemp ++ local LAST_ERR=/tmp/tmp.9tuFFP2gKq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.WZUsEPTLpj ++ cat /tmp/tmp.9tuFFP2gKq ++ rm /tmp/tmp.WZUsEPTLpj /tmp/tmp.9tuFFP2gKq ++ return 0 + client_pod=pxc-client-56fb78495-c2kwl + wait_pod pxc-client-56fb78495-c2kwl + local pod=pxc-client-56fb78495-c2kwl + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-c2kwl ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-c2kwl condition met pxc-client-56fb78495-c2kwl.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.DXqsn8c4E5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.DXqsn8c4E5/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issue-pxc-2.some-name-tls-issue-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZvOJbSkj4g +++ mktemp ++ local LAST_ERR=/tmp/tmp.7rykvjU4Qe ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZvOJbSkj4g ++ cat /tmp/tmp.7rykvjU4Qe ++ rm /tmp/tmp.ZvOJbSkj4g /tmp/tmp.7rykvjU4Qe ++ return 0 + client_pod=pxc-client-56fb78495-c2kwl + wait_pod pxc-client-56fb78495-c2kwl + local pod=pxc-client-56fb78495-c2kwl + local max_retry=480 + local ns= ++ echo pxc-client-56fb78495-c2kwl ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-56fb78495-c2kwl condition met pxc-client-56fb78495-c2kwl.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.DXqsn8c4E5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/select-1.sql /tmp/tmp.DXqsn8c4E5/select-1.sql ++ is_keyring_plugin_in_use some-name-tls-issue ++ local cluster=some-name-tls-issue ++ kubectl_bin exec -it some-name-tls-issue-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.k0wR8NyR85 +++ mktemp ++ local LAST_ERR=/tmp/tmp.7NkdD0LtZ9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-tls-issue-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.k0wR8NyR85 ++ cat /tmp/tmp.7NkdD0LtZ9 Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.k0wR8NyR85 /tmp/tmp.7NkdD0LtZ9 ++ return 0 + '[' '' ']' + wait_cluster_consistency some-name-tls-issue 3 2 + local cluster_name=some-name-tls-issue + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xpSoWGmCa4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.fik6cCNx6R ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xpSoWGmCa4 ++ cat /tmp/tmp.fik6cCNx6R ++ rm /tmp/tmp.xpSoWGmCa4 /tmp/tmp.fik6cCNx6R ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jG3iQjYKoj +++ mktemp ++ local LAST_ERR=/tmp/tmp.9CZwlaiTcy ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jG3iQjYKoj ++ cat /tmp/tmp.9CZwlaiTcy ++ rm /tmp/tmp.jG3iQjYKoj /tmp/tmp.9CZwlaiTcy ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name-tls-issue +++ local cluster_name=some-name-tls-issue ++++ get_proxy some-name-tls-issue ++++ local target_cluster=some-name-tls-issue +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.3JsbvvxetZ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.jHc45D9vhG +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.3JsbvvxetZ +++++ cat /tmp/tmp.jHc45D9vhG +++++ rm /tmp/tmp.3JsbvvxetZ /tmp/tmp.jHc45D9vhG +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.LmuztZmdnl ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.WQAd2DRN9C +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.LmuztZmdnl +++++ cat /tmp/tmp.WQAd2DRN9C +++++ rm /tmp/tmp.LmuztZmdnl /tmp/tmp.WQAd2DRN9C +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-tls-issue-proxysql ++++ return +++ local cluster_proxy=some-name-tls-issue-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nARO0ZhfLk +++ mktemp ++ local LAST_ERR=/tmp/tmp.HdBZt6g9MX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nARO0ZhfLk ++ cat /tmp/tmp.HdBZt6g9MX ++ rm /tmp/tmp.nARO0ZhfLk /tmp/tmp.HdBZt6g9MX ++ return 0 + [[ 2 == \2 ]] + desc 'check if certificates issued with certmanager' + set +o xtrace ----------------------------------------------------------------------------------- check if certificates issued with certmanager ----------------------------------------------------------------------------------- + tlsSecretsShouldExist some-name-tls-issue-ssl + local secretName=some-name-tls-issue-ssl + checkTLSSecret some-name-tls-issue-ssl ca.crt + local secretName=some-name-tls-issue-ssl + local dataKey=ca.crt ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json +++ mktemp ++ jq '.data["ca.crt"]' ++ local LAST_OUT=/tmp/tmp.5JKJlu7gV9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.rjuhrQm4sq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5JKJlu7gV9 ++ cat /tmp/tmp.rjuhrQm4sq ++ rm /tmp/tmp.5JKJlu7gV9 /tmp/tmp.rjuhrQm4sq ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issue-ssl tls.crt + local secretName=some-name-tls-issue-ssl + local dataKey=tls.crt ++ jq '.data["tls.crt"]' ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json +++ mktemp ++ local LAST_OUT=/tmp/tmp.CmO7CuqhVu +++ mktemp ++ local LAST_ERR=/tmp/tmp.CXyBkkkzi8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CmO7CuqhVu ++ cat /tmp/tmp.CXyBkkkzi8 ++ rm /tmp/tmp.CmO7CuqhVu /tmp/tmp.CXyBkkkzi8 ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issue-ssl tls.key + local secretName=some-name-tls-issue-ssl + local dataKey=tls.key ++ kubectl_bin get secrets/some-name-tls-issue-ssl -o json ++ jq '.data["tls.key"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3u26gO4ph8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.SM1VGhmWvt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issue-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3u26gO4ph8 ++ cat /tmp/tmp.SM1VGhmWvt ++ rm /tmp/tmp.3u26gO4ph8 /tmp/tmp.SM1VGhmWvt ++ return 0 + local 'secretData="LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb3dJQkFBS0NBUUVBckgraTlKM0VsRDlvend5ZnpDVHpqZGNWSHhMeU1TQ3lxN21mT0FkY29kTmZwb1N2CktycjBBYTZUeGFxeUhMSWgzVS9FSXZZL3VKTW1PRFdiODRkUkdZYnVxVE1Pb2lldUFFWFc3aTBVRGRWeFY4Ni8KQThWbUtXVE91UUN2SFI1RUNDT0RSR2x3Z2RtaVdtNjRPQUU5MUdVdHlmaHoxNE5CZHpiRThDcitpYlJDT05aawpjUzBaeVZEaHJMRG9YNHVHMnZpcFNYSEpNK1RxamhSQXIyQ2FXOFgrN0VFT1NDOTh2TU1YMzdyTUVwYWNWaGkxCldadk9CK24xWkIwS2ZsSXpwZW1Hc0lBQy84VW9HWm1BaUQvZTQ4bWo5VVVGVHlwYTlldXhLRmcrdmxsOC9Sa0cKaG0wcmJpeHgzZzRRTG1KK29IaHdielZGRk9uZHljR1V6cGgwVlFJREFRQUJBb0lCQUdWUVlnbUNVRjh5RHdEcwp6VDQ5eGI3ZFFNNkxkaXhjcEJRd1pjK21vMFY0dklrMURSenZ5VGpqckc5QW5uUTBPNmVjbmZwYTMzb3RFeG1ZCmd3dzV3ZXhZVC95WXZGT0pNcTErVjRwMGQzN1lpa1drYkpSdWNGNkhrdE1lRDd2dWRzN0E3T3hWY1hzU3RFU2gKR3hucHdNTHEya1h4NHpnRkk0STliTllTcW9WOW5yTFZYdFVvOWRXbEdVUTR0bFU1UUhXamdzdkkwVzN2TXNIbQpEQzk0VVZzK2o3MWt2Vms1VU5Ld1huUVJGem13d3VadEtaUkpGRHhXQTBMUlEwaGRZem1oZEVhQWhTYlhraVdmCkdkbmdyMmd0dE54SUZ3UGVvUzZrSFVnVmpZWnRaa3BaMkZZY2hTSXk5MEFBeGZNM0d0K3lrMmlVUmF1Y0RVSEYKTTJFV2IxRUNnWUVBeEtoSkZ6ZVFhamRiZGc4WTZycUQwbkg2OERTY1lGV2xRTURwRVRKTS9zRU9HK25sdnkybwpzenRSNjl5WWhEQTVaL01xNjlDWHN2WFpocS8xM0U4TFN4SVo0TVg2dGFBbW5MdHR0YVZJZlFIMEszcCtUNEtaCndvbFh1WUVOMHdxOUdYTjIwc1RxUVdyMGQ2dEI5WDVEWGx2aEk5amoyeXVEQUNaSWhJSkp3UGNDZ1lFQTRJMFgKMXJFeGtBQnludm9oMUllK04xdHNmcU94cGJEVlU2ZGpIaHRWaGo3QXBWZ0tvWFFIRkZiekEyTDh2Njl5TjQ2KwpVOXhmTjZING1WRHJycXAvVHpmUVRPMzVTeGNEM2s3UUdJSG02QmFVZjlYYnV5eFREa3NUaDJvVnloYkVaUlVQCkJGSzdLR0RjUGFUS2FrK0U4cnRQYklyOHY0d2UySXVYL3NjemJoTUNnWUVBa29Ball3NWJvU1Q0RjYwTGpPSEIKamlhbklBYXhiL3FkanUybk1zNWNHWFJNUkhNc1dnMXpuWUhWZDNYd2tKazBTc0lWK1hKOWNDNUNERnBOT0FBUwprNnc2WnY1VjFMUW56NTY1RGhiQk40OGJETURHRkFsZzdsRk9icjA3UlRxOHdKY0pyOTVOL01ubXNMZDkvWnBBCkthMGN2WTIzd1BCYk9PTk1KcHJBd3VVQ2dZQWN2bExQMjR5eGx5MFU1b1hRRTdRb2w5NVNjNWU0MHVMcnUyQjMKcVI0UWVoWGsxRmxBQTM4b2ZsekxFUyt6UmIwRUdaU0pYWXNlcnZBSWlCQXpJb1g3V1BTajlFNVY2MU5HY0tZNApqT0JHMHlVZEcvM3RmcVgvRFdNcGtVM0t1WkZZTXhMaUJja0pTU1RJQzBFUnpLNEMrREVaZnMwTm85MEs4UXQ2CnhIcnoyd0tCZ0g1VXJGTDZteVNqU0czdjNDQnpaK05zWXNKVmdHaEtuZU5WbVZRNHJ1eWowemY5d2YrUmRPODcKaG0xMW5rOHVrL2hjOTRlMjhtcndKT0pKeUU1bVBqeUpObnNWM2x5cmgvbllJK3RTTmZYN1VZQUFvVTRYSVJwSgpLcmxSTU9QZzJadEhoeVBORG1OTHlEay8xalAxbVdyV2p2NUVmT05NRmNwK3ZlRXhtd2phCi0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0tCg=="' + '[' -z '"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"' ']' + desc 'check if CA issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if CA issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-tls-issue-pxc-ca-issuer + local resource=issuer/some-name-tls-issue-pxc-ca-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer.yml + local new_result=/tmp/tmp.DXqsn8c4E5/issuer_some-name-tls-issue-pxc-ca-issuer.yml + desc 'compare issuer/some-name-tls-issue-pxc-ca-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare issuer/some-name-tls-issue-pxc-ca-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer-eks.yml ']' + kubectl_bin get -o yaml issuer/some-name-tls-issue-pxc-ca-issuer + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-26476", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.0IA6RfbSuc ++ mktemp + local LAST_ERR=/tmp/tmp.NF1nZSbt37 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-tls-issue-pxc-ca-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0IA6RfbSuc + cat /tmp/tmp.NF1nZSbt37 + rm /tmp/tmp.0IA6RfbSuc /tmp/tmp.NF1nZSbt37 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-ca-issuer.yml /tmp/tmp.DXqsn8c4E5/issuer_some-name-tls-issue-pxc-ca-issuer.yml + desc 'check if issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-tls-issue-pxc-issuer + local resource=issuer/some-name-tls-issue-pxc-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer.yml + local new_result=/tmp/tmp.DXqsn8c4E5/issuer_some-name-tls-issue-pxc-issuer.yml + desc 'compare issuer/some-name-tls-issue-pxc-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare issuer/some-name-tls-issue-pxc-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.29' + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer-eks.yml ']' + kubectl_bin get -o yaml issuer/some-name-tls-issue-pxc-issuer ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-26476", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.vVHZqxV9xi ++ mktemp + local LAST_ERR=/tmp/tmp.jD5wV1rSF4 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-tls-issue-pxc-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vVHZqxV9xi + cat /tmp/tmp.jD5wV1rSF4 + rm /tmp/tmp.vVHZqxV9xi /tmp/tmp.jD5wV1rSF4 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-tls-issue-pxc-issuer.yml /tmp/tmp.DXqsn8c4E5/issuer_some-name-tls-issue-pxc-issuer.yml + desc 'check if certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-tls-issue-ssl + local resource=certificate/some-name-tls-issue-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl.yml + local new_result=/tmp/tmp.DXqsn8c4E5/certificate_some-name-tls-issue-ssl.yml + desc 'compare certificate/some-name-tls-issue-ssl-' + set +o xtrace ----------------------------------------------------------------------------------- compare certificate/some-name-tls-issue-ssl- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl-eks.yml ']' + kubectl_bin get -o yaml certificate/some-name-tls-issue-ssl + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-26476", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.8HFMQdP5XS ++ mktemp + local LAST_ERR=/tmp/tmp.8IQv7177F2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-tls-issue-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8HFMQdP5XS + cat /tmp/tmp.8IQv7177F2 + rm /tmp/tmp.8HFMQdP5XS /tmp/tmp.8IQv7177F2 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-tls-issue-ssl.yml /tmp/tmp.DXqsn8c4E5/certificate_some-name-tls-issue-ssl.yml + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1743/e2e-tests/tls-issue-cert-manager/conf/some-name-tls-issue-haproxy.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.YbzJXRSfLX + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' ++ mktemp + local LAST_ERR=/tmp/tmp.bFl4B3iN1P + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-26476~ + kubectl apply -f - + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1743-51af0517#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YbzJXRSfLX perconaxtradbcluster.pxc.percona.com/some-name-tls-issue configured + cat /tmp/tmp.bFl4B3iN1P + rm /tmp/tmp.YbzJXRSfLX /tmp/tmp.bFl4B3iN1P + return 0 + wait_for_running some-name-tls-issue-haproxy 1 + local name=some-name-tls-issue-haproxy + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issue-haproxy-0 480 + local pod=some-name-tls-issue-haproxy-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issue-haproxy-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/some-name-tls-issue-haproxy-0 condition met some-name-tls-issue-haproxy-0Defaulted container "haproxy" out of: haproxy, pxc-monit, pxc-init (init) .Ok + wait_cluster_consistency some-name-tls-issue 3 2 + local cluster_name=some-name-tls-issue + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ydW5nvjGMh +++ mktemp ++ local LAST_ERR=/tmp/tmp.IAvSVfqHzu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ydW5nvjGMh ++ cat /tmp/tmp.IAvSVfqHzu ++ rm /tmp/tmp.ydW5nvjGMh /tmp/tmp.IAvSVfqHzu ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LgQ3qUd0Dp +++ mktemp ++ local LAST_ERR=/tmp/tmp.9IN8IgEfB8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LgQ3qUd0Dp ++ cat /tmp/tmp.9IN8IgEfB8 ++ rm /tmp/tmp.LgQ3qUd0Dp /tmp/tmp.9IN8IgEfB8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.N2ORAiq4HG +++ mktemp ++ local LAST_ERR=/tmp/tmp.siWhiAhbTO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.N2ORAiq4HG ++ cat /tmp/tmp.siWhiAhbTO ++ rm /tmp/tmp.N2ORAiq4HG /tmp/tmp.siWhiAhbTO ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GUi1MUrHaO +++ mktemp ++ local LAST_ERR=/tmp/tmp.k5TXJMNQwK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GUi1MUrHaO ++ cat /tmp/tmp.k5TXJMNQwK ++ rm /tmp/tmp.GUi1MUrHaO /tmp/tmp.k5TXJMNQwK ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.i800vgqBVB +++ mktemp ++ local LAST_ERR=/tmp/tmp.yGz0xjlCgs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.i800vgqBVB ++ cat /tmp/tmp.yGz0xjlCgs ++ rm /tmp/tmp.i800vgqBVB /tmp/tmp.yGz0xjlCgs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d2P0GuIMVf +++ mktemp ++ local LAST_ERR=/tmp/tmp.AWqZEQtdsb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.d2P0GuIMVf ++ cat /tmp/tmp.AWqZEQtdsb ++ rm /tmp/tmp.d2P0GuIMVf /tmp/tmp.AWqZEQtdsb ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fSMdcp4Ufx +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZMXlputPWp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fSMdcp4Ufx ++ cat /tmp/tmp.ZMXlputPWp ++ rm /tmp/tmp.fSMdcp4Ufx /tmp/tmp.ZMXlputPWp ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UvVFu6w5xf +++ mktemp ++ local LAST_ERR=/tmp/tmp.9iVog3wHRZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UvVFu6w5xf ++ cat /tmp/tmp.9iVog3wHRZ ++ rm /tmp/tmp.UvVFu6w5xf /tmp/tmp.9iVog3wHRZ ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name-tls-issue +++ local cluster_name=some-name-tls-issue ++++ get_proxy some-name-tls-issue ++++ local target_cluster=some-name-tls-issue +++++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.tFxBasti7B ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.qI2i1c7I6B +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.tFxBasti7B +++++ cat /tmp/tmp.qI2i1c7I6B +++++ rm /tmp/tmp.tFxBasti7B /tmp/tmp.qI2i1c7I6B +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-tls-issue-haproxy ++++ return +++ local cluster_proxy=some-name-tls-issue-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name-tls-issue -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.62u50e91cQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.BGpHVKEf5v ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issue -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.62u50e91cQ ++ cat /tmp/tmp.BGpHVKEf5v ++ rm /tmp/tmp.62u50e91cQ /tmp/tmp.BGpHVKEf5v ++ return 0 + [[ 2 == \2 ]] + desc 'check ssl-internal certificate using PXC' + set +o xtrace ----------------------------------------------------------------------------------- check ssl-internal certificate using PXC ----------------------------------------------------------------------------------- + check_verify_identity some-name-tls-issue-pxc + local host=some-name-tls-issue-pxc + local command=exit + local 'args=--ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' + kubectl_bin exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' ++ mktemp + local LAST_OUT=/tmp/tmp.uyDpwK1H08 ++ mktemp + local LAST_ERR=/tmp/tmp.rMmQAcnTOQ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-pxc' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.uyDpwK1H08 + cat /tmp/tmp.rMmQAcnTOQ Defaulted container "pxc" out of: pxc, pxc-init (init) mysql: [Warning] Using a password on the command line interface can be insecure. + rm /tmp/tmp.uyDpwK1H08 /tmp/tmp.rMmQAcnTOQ + return 0 + desc 'check ssl-internal certificate using HAProxy' + set +o xtrace ----------------------------------------------------------------------------------- check ssl-internal certificate using HAProxy ----------------------------------------------------------------------------------- + check_verify_identity some-name-tls-issue-haproxy + local host=some-name-tls-issue-haproxy + local command=exit + local 'args=--ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' + kubectl_bin exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' ++ mktemp + local LAST_OUT=/tmp/tmp.RINWQmmrx5 ++ mktemp + local LAST_ERR=/tmp/tmp.p0pt3RVxST + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec some-name-tls-issue-pxc-0 -- bash -c 'printf '\''%s\n'\'' "exit" | mysql -sN --ssl-ca=/etc/mysql/ssl-internal/ca.crt --ssl-mode=VERIFY_IDENTITY --protocol=tcp -uroot -proot_password --host=some-name-tls-issue-haproxy' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RINWQmmrx5 + cat /tmp/tmp.p0pt3RVxST Defaulted container "pxc" out of: pxc, pxc-init (init) mysql: [Warning] Using a password on the command line interface can be insecure. + rm /tmp/tmp.RINWQmmrx5 /tmp/tmp.p0pt3RVxST + return 0 + destroy tls-issue-cert-manager-26476 + local namespace=tls-issue-cert-manager-26476 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ + sort -u + grep -v 'the object has been modified' +++ grep -c percona-xtradb-cluster-operator + grep -v 'get backup status: Job.batch' + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + tee /tmp/tmp.DXqsn8c4E5/operator.log +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.OwqwTM8xTu +++ mktemp ++ local LAST_ERR=/tmp/tmp.uTCuA973P6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OwqwTM8xTu ++ cat /tmp/tmp.uTCuA973P6 ++ rm /tmp/tmp.OwqwTM8xTu /tmp/tmp.uTCuA973P6 ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-675fc7d9f5-gxq52 ++ mktemp + local LAST_OUT=/tmp/tmp.fUbARfR8cJ ++ mktemp + local LAST_ERR=/tmp/tmp.q1OSHOcnwJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-675fc7d9f5-gxq52 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.fUbARfR8cJ + cat /tmp/tmp.q1OSHOcnwJ + rm /tmp/tmp.fUbARfR8cJ /tmp/tmp.q1OSHOcnwJ + return 0 2024-07-10T13:19:26.190Z INFO setup Manager starting up {"gitCommit": "51af051703ea68e6367821ec3068826842ab5c9d", "gitBranch": "PR-1743-51af0517", "buildTime": "2024-07-10T11:38:48Z", "goVersion": "go1.22.5", "os": "linux", "arch": "amd64"} 2024-07-10T13:19:26.190Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.26.15-gke.1469001"} 2024-07-10T13:19:26.191Z INFO setup Registering Components. 2024-07-10T13:19:28.266Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-07-10T13:19:28.270Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-07-10T13:19:28.270Z INFO controller-runtime.metrics Starting metrics server 2024-07-10T13:19:28.270Z INFO setup Starting the Cmd. 2024-07-10T13:19:28.270Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-07-10T13:19:28.271Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-07-10T13:19:28.271Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-07-10T13:19:28.271Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-07-10T13:19:28.271Z INFO controller-runtime.webhook Starting webhook server 2024-07-10T13:19:28.371Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-07-10T13:19:28.398Z DEBUG events percona-xtradb-cluster-operator-675fc7d9f5-gxq52_461a1cae-8466-48b2-ad08-459b5a8486ba became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"c5ce0a73-8540-41cf-be87-324beeb43ffb","apiVersion":"coordination.k8s.io/v1","resourceVersion":"53314"}, "reason": "LeaderElection"} 2024-07-10T13:19:28.398Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-07-10T13:19:28.399Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-07-10T13:19:28.399Z INFO Starting Controller {"controller": "pxc-controller"} 2024-07-10T13:19:28.399Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-07-10T13:19:28.399Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2024-07-10T13:19:28.399Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2024-07-10T13:19:28.399Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2024-07-10T13:19:28.507Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-07-10T13:19:28.519Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-07-10T13:19:28.519Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-07-10T13:21:45.936Z INFO Set CR version {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "version": "1.15.0"} 2024-07-10T13:21:52.532Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-pxc"} 2024-07-10T13:21:52.716Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-proxysql"} 2024-07-10T13:21:52.816Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-pxc"} 2024-07-10T13:21:52.976Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-pxc-unready"} 2024-07-10T13:21:53.166Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-proxysql"} 2024-07-10T13:21:53.281Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-proxysql"} 2024-07-10T13:21:53.339Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "6bb5316f-2cd2-49e2-b4b4-88aa31c6ea03", "object": "some-name-tls-issue-proxysql-unready"} 2024-07-10T13:21:53.459Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "8c6390de-8d25-42ec-a614-44e13077ec6c", "object": "some-name-tls-issue-pxc"} 2024-07-10T13:23:10.924Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2", "user": "operator"} 2024-07-10T13:23:10.963Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2", "user": "monitor"} 2024-07-10T13:23:11.059Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2"} 2024-07-10T13:23:11.103Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2"} 2024-07-10T13:23:11.146Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2", "user": "xtrabackup"} 2024-07-10T13:23:11.209Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2"} 2024-07-10T13:23:11.251Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2", "user": "replication"} 2024-07-10T13:23:11.287Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "672e5f17-b614-4059-9cab-bace9e05d9f2", "err": "get primary pxc pod: not found"} 2024-07-10T13:23:15.963Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "3579f658-7665-4210-b1bb-8178a61bbbd4", "err": "get primary pxc pod: not found"} 2024-07-10T13:23:21.176Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "81779362-7732-468f-b98a-903c0dff944f", "err": "get primary pxc pod: not found"} 2024-07-10T13:23:26.305Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "ffb3ed1e-4b78-4607-922a-ddd27bc46ba5", "err": "get primary pxc pod: not found"} 2024-07-10T13:25:37.476Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "c9108430-2cc7-46b2-b016-95475bddd9f8", "user": "root"} 2024-07-10T13:25:37.700Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "c9108430-2cc7-46b2-b016-95475bddd9f8", "new version": "8.0.36-28.1"} 2024-07-10T13:25:40.815Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "c9108430-2cc7-46b2-b016-95475bddd9f8"} 2024-07-10T13:25:45.709Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "3294d197-ab08-4995-800c-312358538afe"} 2024-07-10T13:25:51.069Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "7962f948-ada6-4c48-bfd5-3a830eafad73"} 2024-07-10T13:25:56.410Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "dd6a3a5c-dde3-44be-811b-b0302697cd98"} 2024-07-10T13:26:02.625Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "877a6fdb-f86b-48b2-92a0-79fb20528268"} 2024-07-10T13:26:07.010Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "ea2b1a9a-3145-4a5f-85f4-e52b6c03ecc9"} 2024-07-10T13:26:12.296Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "04977720-9d9b-439b-86c6-c1c0f802ebd0"} 2024-07-10T13:26:18.613Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "c02afee7-b4af-4978-9ba7-a8a67ba2c915"} 2024-07-10T13:26:23.693Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "34c84421-e037-4965-a485-23ca66bd20e8"} 2024-07-10T13:26:29.011Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "ce6a14f9-3926-45b8-8344-6ae049846d41"} 2024-07-10T13:26:34.405Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "e7d5477b-cbbf-446f-9529-f079ca52ab83"} 2024-07-10T13:26:39.703Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "4cb26199-41ec-4619-b5b4-79d8933e00dd"} 2024-07-10T13:26:45.112Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "b0be14e4-fa6a-451c-bad1-4089e0f43e6c"} 2024-07-10T13:26:50.911Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "a7b1a0c8-63f1-4e07-b7ed-43a655df577e"} 2024-07-10T13:26:55.979Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "5daa80b3-8899-4763-8e36-f59226652131"} 2024-07-10T13:27:01.994Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "766c1acc-5686-47e6-9990-4d2380d161c2"} 2024-07-10T13:27:05.664Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "object": "some-name-tls-issue-pxc"} 2024-07-10T13:27:05.733Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "object": "some-name-tls-issue-haproxy"} 2024-07-10T13:27:05.793Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "object": "some-name-tls-issue-haproxy"} 2024-07-10T13:27:05.915Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "object": "some-name-tls-issue-haproxy"} 2024-07-10T13:27:06.030Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "object": "some-name-tls-issue-haproxy-replicas"} 2024-07-10T13:27:06.193Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: a8898db9-f5c8-4f17-a514-ac6cf5886a29 2024-07-10T13:27:06.631Z ERROR sync users {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "7c1373c9-827f-4eb2-af8b-b0080d025115", "error": "exec syncusers: command terminated with exit code 137 / \nSyncing user accounts from PXC(some-name-tls-issue-pxc-0.some-name-tls-issue-pxc.tls-issue-cert-manager-26476.svc.cluster.local:3306) to ProxySQL\n / ", "errorVerbose": "exec syncusers: command terminated with exit code 137 / \nSyncing user accounts from PXC(some-name-tls-issue-pxc-0.some-name-tls-issue-pxc.tls-issue-cert-manager-26476.svc.cluster.local:3306) to ProxySQL\n / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1225\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-10T13:27:08.510Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "d5afefb6-0117-4bf2-976d-d46a916f6291", "err": "get primary pxc pod: failed to get proxy connection: dial tcp 10.79.69.90:3306: connect: connection refused"} 2024-07-10T13:28:02.570Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "87390c5f-54bd-4899-b6b3-290edbbeb527", "err": "failed to ensure cluster readonly status: connect to pod some-name-tls-issue-pxc-1: dial tcp 10.206.194.39:33062: connect: connection refused"} 2024-07-10T13:29:03.304Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-cert-manager-26476", "name": "some-name-tls-issue", "reconcileID": "e8927797-d763-4b29-a3c1-4c6c1bfde192", "err": "failed to ensure cluster readonly status: connect to pod some-name-tls-issue-pxc-0: dial tcp: lookup some-name-tls-issue-pxc-0.some-name-tls-issue-pxc.tls-issue-cert-manager-26476 on 10.79.64.10:53: no such host"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1227 [mysql] 2024/07/10 13:28:02 connection.go:49: read tcp 10.206.194.34:54322->10.206.194.39:33062: read: connection reset by peer [mysql] 2024/07/10 13:29:03 connection.go:49: unexpected EOF + grep -v NAMESPACE + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-cert-manager-26476 some-name-tls-issue --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name-tls-issue patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.YGYQVbXTPC ++ mktemp + local LAST_ERR=/tmp/tmp.0POGrKbhJJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YGYQVbXTPC perconaxtradbcluster.pxc.percona.com "some-name-tls-issue" deleted + cat /tmp/tmp.0POGrKbhJJ + rm /tmp/tmp.YGYQVbXTPC /tmp/tmp.0POGrKbhJJ + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.GQZDfDikQ4 ++ mktemp + local LAST_ERR=/tmp/tmp.hNvOPfKpLD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.GQZDfDikQ4 No resources found + cat /tmp/tmp.hNvOPfKpLD + rm /tmp/tmp.GQZDfDikQ4 /tmp/tmp.hNvOPfKpLD + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.nk9pPmWxMy ++ mktemp + local LAST_ERR=/tmp/tmp.2K2Z1yTKtL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.nk9pPmWxMy No resources found + cat /tmp/tmp.2K2Z1yTKtL + rm /tmp/tmp.nk9pPmWxMy /tmp/tmp.2K2Z1yTKtL + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.tpjxQduUUf ++ mktemp + local LAST_ERR=/tmp/tmp.biCHPG5LAC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.tpjxQduUUf validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.biCHPG5LAC + rm /tmp/tmp.tpjxQduUUf /tmp/tmp.biCHPG5LAC + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace tls-issue-cert-manager-26476 + rm -rf /tmp/tmp.DXqsn8c4E5 + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.50OCRaXMbN + local LAST_OUT=/tmp/tmp.WjPEmoasZW + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed++ mktemp ----------------------------------------------------------------------------------- ++ mktemp + local LAST_ERR=/tmp/tmp.UmUso9wzq0 + local exit_status=0 + local LAST_ERR=/tmp/tmp.ciO5woIf8a + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace tls-issue-cert-manager-26476 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator