Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/logs/users-5-7.log WARNING: version difference between client (1.30) and server (1.27) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.27) exceeds the supported minor version skew of +/-1 + create_infra users-14210 + local ns=users-14210 + '[' -n pxc-operator ']' + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + kubectl patch pxc -n users-18962 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.vlHyBYvcOg ++ mktemp + local LAST_ERR=/tmp/tmp.Nr20eWrrnl + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vlHyBYvcOg perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.Nr20eWrrnl + rm /tmp/tmp.vlHyBYvcOg /tmp/tmp.Nr20eWrrnl + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.YVWxpPNbLF ++ mktemp + local LAST_ERR=/tmp/tmp.IYdrbjdWnC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YVWxpPNbLF No resources found + cat /tmp/tmp.IYdrbjdWnC + rm /tmp/tmp.YVWxpPNbLF /tmp/tmp.IYdrbjdWnC + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.ASsjGMSUgB ++ mktemp + local LAST_ERR=/tmp/tmp.Tuju5PcVBD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ASsjGMSUgB No resources found + cat /tmp/tmp.Tuju5PcVBD + rm /tmp/tmp.ASsjGMSUgB /tmp/tmp.Tuju5PcVBD + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.735Ko3abkK + local LAST_OUT=/tmp/tmp.7fUfCOtuOu ++ mktemp ++ mktemp + xargs kubectl delete ns + local LAST_ERR=/tmp/tmp.Tnovlr4RRO + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.f5RDfFxEC7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.735Ko3abkK + cat /tmp/tmp.Tnovlr4RRO + rm /tmp/tmp.735Ko3abkK /tmp/tmp.Tnovlr4RRO + return 0 namespace "gmp-public" deleted namespace "gmp-system" deleted namespace "users-18962" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7fUfCOtuOu namespace "pxc-operator" deleted + cat /tmp/tmp.f5RDfFxEC7 + rm /tmp/tmp.7fUfCOtuOu /tmp/tmp.f5RDfFxEC7 + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.swrAJSgrDD ++ mktemp + local LAST_ERR=/tmp/tmp.FFf2iDijhm + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.swrAJSgrDD namespace/pxc-operator created + cat /tmp/tmp.FFf2iDijhm + rm /tmp/tmp.swrAJSgrDD /tmp/tmp.FFf2iDijhm + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.POQ4LR3moR +++ mktemp ++ local LAST_ERR=/tmp/tmp.lKCfY6cQMj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.POQ4LR3moR ++ cat /tmp/tmp.lKCfY6cQMj ++ rm /tmp/tmp.POQ4LR3moR /tmp/tmp.lKCfY6cQMj ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.86PpfiQllP ++ mktemp + local LAST_ERR=/tmp/tmp.ePqGoJb6Zq + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.86PpfiQllP Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8" modified. + cat /tmp/tmp.ePqGoJb6Zq + rm /tmp/tmp.86PpfiQllP /tmp/tmp.ePqGoJb6Zq + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.WArXP14H9B ++ mktemp + local LAST_ERR=/tmp/tmp.ecKaGSghgE + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WArXP14H9B customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.ecKaGSghgE + rm /tmp/tmp.WArXP14H9B /tmp/tmp.ecKaGSghgE + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/deploy/cw-rbac.yaml + kubectl_bin apply -f - + sed -e 's^namespace: .*^namespace: pxc-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.S1WLR49hhW ++ mktemp + local LAST_ERR=/tmp/tmp.ip94qLpR6l + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.S1WLR49hhW clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.ip94qLpR6l + rm /tmp/tmp.S1WLR49hhW /tmp/tmp.ip94qLpR6l + return 0 + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/deploy/cw-operator.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1774-70b9684b^' + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - ++ mktemp + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - + local LAST_OUT=/tmp/tmp.Cn4B6nj5zr ++ mktemp + local LAST_ERR=/tmp/tmp.Cu75CbWDhx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Cn4B6nj5zr deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.Cu75CbWDhx + rm /tmp/tmp.Cn4B6nj5zr /tmp/tmp.Cu75CbWDhx + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.9LjwXUKvej ++ mktemp + local LAST_ERR=/tmp/tmp.2zjW1CjvdB + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9LjwXUKvej pod/percona-xtradb-cluster-operator-56bc5d9fb9-mfd74 condition met + cat /tmp/tmp.2zjW1CjvdB + rm /tmp/tmp.9LjwXUKvej /tmp/tmp.2zjW1CjvdB + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.QrHoEcCG2V +++ mktemp ++ local LAST_ERR=/tmp/tmp.1pUQLnXTsH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QrHoEcCG2V ++ cat /tmp/tmp.1pUQLnXTsH ++ rm /tmp/tmp.QrHoEcCG2V /tmp/tmp.1pUQLnXTsH ++ return 0 + wait_pod percona-xtradb-cluster-operator-56bc5d9fb9-mfd74 480 pxc-operator + local pod=percona-xtradb-cluster-operator-56bc5d9fb9-mfd74 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-56bc5d9fb9-mfd74 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-56bc5d9fb9-mfd74 condition met percona-xtradb-cluster-operator-56bc5d9fb9-mfd74.Ok + sleep 3 + create_namespace users-14210 + local namespace=users-14210 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + '[' -n '' ']' + desc 'cleaned up old namespaces users-14210' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces users-14210 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace users-14210 ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.LXr3B0lujT + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + local LAST_OUT=/tmp/tmp.Oxwi6WCn9Q ++ mktemp + local LAST_ERR=/tmp/tmp.7fTlGHKk0A + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns ++ mktemp + local LAST_ERR=/tmp/tmp.c66hiUENMR + local exit_status=0 ++ seq 0 2 + awk '{print$1}' + xargs kubectl delete ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-14210 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-14210 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.LXr3B0lujT + cat /tmp/tmp.7fTlGHKk0A + rm /tmp/tmp.LXr3B0lujT /tmp/tmp.7fTlGHKk0A + return 0 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-14210 namespace "gmp-public" deleted namespace "gmp-system" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.Oxwi6WCn9Q + cat /tmp/tmp.c66hiUENMR Error from server (NotFound): namespaces "users-14210" not found + rm /tmp/tmp.Oxwi6WCn9Q /tmp/tmp.c66hiUENMR + return 1 + : + wait_for_delete namespace/users-14210 + local res=namespace/users-14210 + echo -n 'namespace/users-14210 - ' namespace/users-14210 - + set +o xtrace Error from server (NotFound): namespaces "users-14210" not found + desc 'create namespace users-14210' + set +o xtrace ----------------------------------------------------------------------------------- create namespace users-14210 ----------------------------------------------------------------------------------- + kubectl_bin create namespace users-14210 ++ mktemp + local LAST_OUT=/tmp/tmp.Jpjaf3qyRB ++ mktemp + local LAST_ERR=/tmp/tmp.WQ4P3LjUvZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace users-14210 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Jpjaf3qyRB namespace/users-14210 created + cat /tmp/tmp.WQ4P3LjUvZ + rm /tmp/tmp.Jpjaf3qyRB /tmp/tmp.WQ4P3LjUvZ + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.4AU5DET5gc +++ mktemp ++ local LAST_ERR=/tmp/tmp.QDFe4ho0qb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4AU5DET5gc ++ cat /tmp/tmp.QDFe4ho0qb ++ rm /tmp/tmp.4AU5DET5gc /tmp/tmp.QDFe4ho0qb ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8 --namespace=users-14210 ++ mktemp + local LAST_OUT=/tmp/tmp.6uVjYp5OUP ++ mktemp + local LAST_ERR=/tmp/tmp.01Ff0XoC1f + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8 --namespace=users-14210 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6uVjYp5OUP Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1774-70b9684b-1-cluster8" modified. + cat /tmp/tmp.01Ff0XoC1f + rm /tmp/tmp.6uVjYp5OUP /tmp/tmp.01Ff0XoC1f + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.QXXtUQW8Ls ++ mktemp + local LAST_ERR=/tmp/tmp.eD1Ps480OM + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.QXXtUQW8Ls secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.eD1Ps480OM + rm /tmp/tmp.QXXtUQW8Ls /tmp/tmp.eD1Ps480OM + return 0 + desc 'create PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create PXC cluster ----------------------------------------------------------------------------------- + newpass=test-password ++ echo -n test-password ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZA== + cluster=some-name + spinup_pxc some-name /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/some-name.yml + local cluster=some-name + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/some-name.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/secrets.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.aktfqbn6sg ++ mktemp + local LAST_ERR=/tmp/tmp.P4qK8gFJFB + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.aktfqbn6sg secret/my-cluster-secrets created secret/some-name-ssl created secret/some-name-ssl-internal created + cat /tmp/tmp.P4qK8gFJFB + rm /tmp/tmp.aktfqbn6sg /tmp/tmp.P4qK8gFJFB + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1774-70b9684b#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.CL2tTipX62 + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' ++ mktemp + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-14210~ + local LAST_ERR=/tmp/tmp.nh6AjzSdpg + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CL2tTipX62 deployment.apps/pxc-client created + cat /tmp/tmp.nh6AjzSdpg + rm /tmp/tmp.CL2tTipX62 /tmp/tmp.nh6AjzSdpg + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ some-name == \d\e\m\a\n\d\-\b\a\c\k\u\p ]] + [[ some-name == \d\e\m\a\n\d\-\b\a\c\k\u\p\-\c\l\o\u\d ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/conf/some-name.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1774-70b9684b#' + local LAST_OUT=/tmp/tmp.0I1emOrqK9 + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' ++ mktemp + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + local LAST_ERR=/tmp/tmp.zuM2UlmT04 + local exit_status=0 + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-14210~ + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' ++ seq 0 2 + /usr/bin/sed -e 's#apply:.*#apply: Never#' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0I1emOrqK9 perconaxtradbcluster.pxc.percona.com/some-name created + cat /tmp/tmp.zuM2UlmT04 + rm /tmp/tmp.0I1emOrqK9 /tmp/tmp.zuM2UlmT04 + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name ++ local target_cluster=some-name +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.I7SxyDfGaq ++++ mktemp +++ local LAST_ERR=/tmp/tmp.0zsO8KeeUc +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.I7SxyDfGaq +++ cat /tmp/tmp.0zsO8KeeUc +++ rm /tmp/tmp.I7SxyDfGaq /tmp/tmp.0zsO8KeeUc +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.lx47JR6HXS ++++ mktemp +++ local LAST_ERR=/tmp/tmp.d8Xsi9VM2z +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.lx47JR6HXS +++ cat /tmp/tmp.d8Xsi9VM2z +++ rm /tmp/tmp.lx47JR6HXS /tmp/tmp.d8Xsi9VM2z +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-proxysql ++ return + local proxy=some-name-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-14210 ++ mktemp + local LAST_OUT=/tmp/tmp.YkqclXCL4S ++ mktemp + local LAST_ERR=/tmp/tmp.0du390Zc3f + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-14210 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-14210 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-14210 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.YkqclXCL4S + cat /tmp/tmp.0du390Zc3f error: no matching resources found + rm /tmp/tmp.YkqclXCL4S /tmp/tmp.0du390Zc3f + return 1 + true + wait_for_running some-name-proxysql 1 + local name=some-name-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-proxysql-0 480 + local pod=some-name-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/some-name-proxysql-0 condition met some-name-proxysql-0.Ok + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met some-name-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met some-name-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace Error from server (NotFound): pods "some-name-pxc-2" not found some-name-pxc-2..................................................Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NxkzATGPGv +++ mktemp ++ local LAST_ERR=/tmp/tmp.qJUfgqHwf6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NxkzATGPGv ++ cat /tmp/tmp.qJUfgqHwf6 Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.NxkzATGPGv /tmp/tmp.qJUfgqHwf6 ++ return 0 + [[ -n '' ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qVeH3lORhd +++ mktemp ++ local LAST_ERR=/tmp/tmp.pOD8PYR3JL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qVeH3lORhd ++ cat /tmp/tmp.pOD8PYR3JL ++ rm /tmp/tmp.qVeH3lORhd /tmp/tmp.pOD8PYR3JL ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3gnTYFr7Y9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.niJsjUKcC4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3gnTYFr7Y9 ++ cat /tmp/tmp.niJsjUKcC4 ++ rm /tmp/tmp.3gnTYFr7Y9 /tmp/tmp.niJsjUKcC4 ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kelgVKcCcb +++ mktemp ++ local LAST_ERR=/tmp/tmp.9Eq6gaA2Cs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kelgVKcCcb ++ cat /tmp/tmp.9Eq6gaA2Cs ++ rm /tmp/tmp.kelgVKcCcb /tmp/tmp.9Eq6gaA2Cs ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql /tmp/tmp.SqFtpPvH1H/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1yyNX2VxKh +++ mktemp ++ local LAST_ERR=/tmp/tmp.V82gdNaTcW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1yyNX2VxKh ++ cat /tmp/tmp.V82gdNaTcW ++ rm /tmp/tmp.1yyNX2VxKh /tmp/tmp.V82gdNaTcW ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql /tmp/tmp.SqFtpPvH1H/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fVsJaYENNf +++ mktemp ++ local LAST_ERR=/tmp/tmp.RQyn3YjRiu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fVsJaYENNf ++ cat /tmp/tmp.RQyn3YjRiu ++ rm /tmp/tmp.fVsJaYENNf /tmp/tmp.RQyn3YjRiu ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-1.sql /tmp/tmp.SqFtpPvH1H/select-1.sql ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oOZqfXzwT6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.EDi7Qvqq3A ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oOZqfXzwT6 ++ cat /tmp/tmp.EDi7Qvqq3A Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.oOZqfXzwT6 /tmp/tmp.EDi7Qvqq3A ++ return 0 + '[' '' ']' + desc 'test root' + set +o xtrace ----------------------------------------------------------------------------------- test root ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets root dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=root + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.UcwvXI7mbg ++ mktemp + local LAST_ERR=/tmp/tmp.TuEV34xgpK + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UcwvXI7mbg secret/my-cluster-secrets patched + cat /tmp/tmp.TuEV34xgpK + rm /tmp/tmp.UcwvXI7mbg /tmp/tmp.TuEV34xgpK + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PyIJ8bppNX +++ mktemp ++ local LAST_ERR=/tmp/tmp.eUTrzbq2hP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PyIJ8bppNX ++ cat /tmp/tmp.eUTrzbq2hP ++ rm /tmp/tmp.PyIJ8bppNX /tmp/tmp.eUTrzbq2hP ++ return 0 + client_pod=pxc-client-7b7f8bcff9-2dvnw + wait_pod pxc-client-7b7f8bcff9-2dvnw + local pod=pxc-client-7b7f8bcff9-2dvnw + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-2dvnw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-2dvnw condition met pxc-client-7b7f8bcff9-2dvnw.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql + desc 'test proxyadmin' + set +o xtrace ----------------------------------------------------------------------------------- test proxyadmin ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.sMdDltteIt ++ mktemp + local LAST_ERR=/tmp/tmp.RXJvwD0EzY + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.sMdDltteIt perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.RXJvwD0EzY + rm /tmp/tmp.sMdDltteIt /tmp/tmp.RXJvwD0EzY + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jWHgNtfEUD +++ mktemp ++ local LAST_ERR=/tmp/tmp.UJfZ0AqalB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jWHgNtfEUD ++ cat /tmp/tmp.UJfZ0AqalB ++ rm /tmp/tmp.jWHgNtfEUD /tmp/tmp.UJfZ0AqalB ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7brd09VlpK +++ mktemp ++ local LAST_ERR=/tmp/tmp.h7MFjz4atH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7brd09VlpK ++ cat /tmp/tmp.h7MFjz4atH ++ rm /tmp/tmp.7brd09VlpK /tmp/tmp.h7MFjz4atH ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aJzQLSqvvm +++ mktemp ++ local LAST_ERR=/tmp/tmp.5xPdZxY62w ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aJzQLSqvvm ++ cat /tmp/tmp.5xPdZxY62w ++ rm /tmp/tmp.aJzQLSqvvm /tmp/tmp.5xPdZxY62w ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.TVwQQRQv3R ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.SaO3Y0NTT3 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.TVwQQRQv3R +++++ cat /tmp/tmp.SaO3Y0NTT3 +++++ rm /tmp/tmp.TVwQQRQv3R /tmp/tmp.SaO3Y0NTT3 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.HgwdXBs8wF ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.YMCd1IggpR +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.HgwdXBs8wF +++++ cat /tmp/tmp.YMCd1IggpR +++++ rm /tmp/tmp.HgwdXBs8wF /tmp/tmp.YMCd1IggpR +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8eguTjH2G2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zhLtNWOZAz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8eguTjH2G2 ++ cat /tmp/tmp.zhLtNWOZAz ++ rm /tmp/tmp.8eguTjH2G2 /tmp/tmp.zhLtNWOZAz ++ return 0 + [[ 3 == \3 ]] + patch_secret my-cluster-secrets proxyadmin dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=proxyadmin + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.DvqKyQN9ZP ++ mktemp + local LAST_ERR=/tmp/tmp.oY5gNG55iz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DvqKyQN9ZP secret/my-cluster-secrets patched + cat /tmp/tmp.oY5gNG55iz + rm /tmp/tmp.DvqKyQN9ZP /tmp/tmp.oY5gNG55iz + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OT7cg7Z1Pg +++ mktemp ++ local LAST_ERR=/tmp/tmp.BjfUQCfeym ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OT7cg7Z1Pg ++ cat /tmp/tmp.BjfUQCfeym ++ rm /tmp/tmp.OT7cg7Z1Pg /tmp/tmp.BjfUQCfeym ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3eztg03ezx +++ mktemp ++ local LAST_ERR=/tmp/tmp.PJlVm75qWa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3eztg03ezx ++ cat /tmp/tmp.PJlVm75qWa ++ rm /tmp/tmp.3eztg03ezx /tmp/tmp.PJlVm75qWa ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EQNrr15ora +++ mktemp ++ local LAST_ERR=/tmp/tmp.XG1d1xZL14 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EQNrr15ora ++ cat /tmp/tmp.XG1d1xZL14 ++ rm /tmp/tmp.EQNrr15ora /tmp/tmp.XG1d1xZL14 ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FZhrKyPo7H +++ mktemp ++ local LAST_ERR=/tmp/tmp.TrTQx089YI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FZhrKyPo7H ++ cat /tmp/tmp.TrTQx089YI ++ rm /tmp/tmp.FZhrKyPo7H /tmp/tmp.TrTQx089YI ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.tKOsZg9G0v ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.yugdUTQ12e +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.tKOsZg9G0v +++++ cat /tmp/tmp.yugdUTQ12e +++++ rm /tmp/tmp.tKOsZg9G0v /tmp/tmp.yugdUTQ12e +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.egQLIJ23Ob ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.i95fUsE1a4 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.egQLIJ23Ob +++++ cat /tmp/tmp.i95fUsE1a4 +++++ rm /tmp/tmp.egQLIJ23Ob /tmp/tmp.i95fUsE1a4 +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xiRpT6Kcch +++ mktemp ++ local LAST_ERR=/tmp/tmp.Mhd8Ht4bI5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xiRpT6Kcch ++ cat /tmp/tmp.Mhd8Ht4bI5 ++ rm /tmp/tmp.xiRpT6Kcch /tmp/tmp.Mhd8Ht4bI5 ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql /tmp/tmp.SqFtpPvH1H/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql /tmp/tmp.SqFtpPvH1H/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-2.sql /tmp/tmp.SqFtpPvH1H/select-2.sql + desc 'test xtrabackup' + set +o xtrace ----------------------------------------------------------------------------------- test xtrabackup ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.y4iU1EcWNC ++ mktemp + local LAST_ERR=/tmp/tmp.7wv7uaf7Oz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.y4iU1EcWNC perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.7wv7uaf7Oz + rm /tmp/tmp.y4iU1EcWNC /tmp/tmp.7wv7uaf7Oz + return 0 + patch_secret my-cluster-secrets xtrabackup dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=xtrabackup + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.E8o3F80N2N ++ mktemp + local LAST_ERR=/tmp/tmp.oP1VfvHBvw + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.E8o3F80N2N secret/my-cluster-secrets patched + cat /tmp/tmp.oP1VfvHBvw + rm /tmp/tmp.E8o3F80N2N /tmp/tmp.oP1VfvHBvw + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.htzykIDEwX +++ mktemp ++ local LAST_ERR=/tmp/tmp.7rrYzZuJyl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.htzykIDEwX ++ cat /tmp/tmp.7rrYzZuJyl ++ rm /tmp/tmp.htzykIDEwX /tmp/tmp.7rrYzZuJyl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bVU3IQiZ37 +++ mktemp ++ local LAST_ERR=/tmp/tmp.M9wmEi2fxS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bVU3IQiZ37 ++ cat /tmp/tmp.M9wmEi2fxS ++ rm /tmp/tmp.bVU3IQiZ37 /tmp/tmp.M9wmEi2fxS ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VorzhPXl7u +++ mktemp ++ local LAST_ERR=/tmp/tmp.oXOtyCUslc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VorzhPXl7u ++ cat /tmp/tmp.oXOtyCUslc ++ rm /tmp/tmp.VorzhPXl7u /tmp/tmp.oXOtyCUslc ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mKtbDwhXjH +++ mktemp ++ local LAST_ERR=/tmp/tmp.fPQnPlBZYU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mKtbDwhXjH ++ cat /tmp/tmp.fPQnPlBZYU ++ rm /tmp/tmp.mKtbDwhXjH /tmp/tmp.fPQnPlBZYU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OcW6wMdDFD +++ mktemp ++ local LAST_ERR=/tmp/tmp.EDFzkwl9Wo ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OcW6wMdDFD ++ cat /tmp/tmp.EDFzkwl9Wo ++ rm /tmp/tmp.OcW6wMdDFD /tmp/tmp.EDFzkwl9Wo ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RXCiCixfAE +++ mktemp ++ local LAST_ERR=/tmp/tmp.qgyddd2ziU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RXCiCixfAE ++ cat /tmp/tmp.qgyddd2ziU ++ rm /tmp/tmp.RXCiCixfAE /tmp/tmp.qgyddd2ziU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oR3JP1hcpM +++ mktemp ++ local LAST_ERR=/tmp/tmp.rFQS0sVRMU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oR3JP1hcpM ++ cat /tmp/tmp.rFQS0sVRMU ++ rm /tmp/tmp.oR3JP1hcpM /tmp/tmp.rFQS0sVRMU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OyvloEmzSr +++ mktemp ++ local LAST_ERR=/tmp/tmp.FobspmviAa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OyvloEmzSr ++ cat /tmp/tmp.FobspmviAa ++ rm /tmp/tmp.OyvloEmzSr /tmp/tmp.FobspmviAa ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 7 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LIyAoU9kZz +++ mktemp ++ local LAST_ERR=/tmp/tmp.Y9rgb0p9EP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LIyAoU9kZz ++ cat /tmp/tmp.Y9rgb0p9EP ++ rm /tmp/tmp.LIyAoU9kZz /tmp/tmp.Y9rgb0p9EP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 8 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6lO5z1l9RH +++ mktemp ++ local LAST_ERR=/tmp/tmp.d3cCqr4qxJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6lO5z1l9RH ++ cat /tmp/tmp.d3cCqr4qxJ ++ rm /tmp/tmp.6lO5z1l9RH /tmp/tmp.d3cCqr4qxJ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 9 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Xd73t9AG70 +++ mktemp ++ local LAST_ERR=/tmp/tmp.DyTYj10xRt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Xd73t9AG70 ++ cat /tmp/tmp.DyTYj10xRt ++ rm /tmp/tmp.Xd73t9AG70 /tmp/tmp.DyTYj10xRt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 10 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5IzRH5rgwr +++ mktemp ++ local LAST_ERR=/tmp/tmp.GgMHWMAlDs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5IzRH5rgwr ++ cat /tmp/tmp.GgMHWMAlDs ++ rm /tmp/tmp.5IzRH5rgwr /tmp/tmp.GgMHWMAlDs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 11 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0iUSfO8TZa +++ mktemp ++ local LAST_ERR=/tmp/tmp.2m5v3yjYSq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0iUSfO8TZa ++ cat /tmp/tmp.2m5v3yjYSq ++ rm /tmp/tmp.0iUSfO8TZa /tmp/tmp.2m5v3yjYSq ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 12 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Lxo4z545m6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.NewCeJsXEG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Lxo4z545m6 ++ cat /tmp/tmp.NewCeJsXEG ++ rm /tmp/tmp.Lxo4z545m6 /tmp/tmp.NewCeJsXEG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 13 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TD2olJ0tP6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZwfX1ptjsF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TD2olJ0tP6 ++ cat /tmp/tmp.ZwfX1ptjsF ++ rm /tmp/tmp.TD2olJ0tP6 /tmp/tmp.ZwfX1ptjsF ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 14 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.X3hgWHFBQl +++ mktemp ++ local LAST_ERR=/tmp/tmp.wtTUzjCa5H ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.X3hgWHFBQl ++ cat /tmp/tmp.wtTUzjCa5H ++ rm /tmp/tmp.X3hgWHFBQl /tmp/tmp.wtTUzjCa5H ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3SkxbbEctt +++ mktemp ++ local LAST_ERR=/tmp/tmp.Z5XNecYaTs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3SkxbbEctt ++ cat /tmp/tmp.Z5XNecYaTs ++ rm /tmp/tmp.3SkxbbEctt /tmp/tmp.Z5XNecYaTs ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.6vDE3ZGFOu ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.cBMuv7IM4T +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.6vDE3ZGFOu +++++ cat /tmp/tmp.cBMuv7IM4T +++++ rm /tmp/tmp.6vDE3ZGFOu /tmp/tmp.cBMuv7IM4T +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.5A1nfG1D8V ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.viay6f8YHF +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.5A1nfG1D8V +++++ cat /tmp/tmp.viay6f8YHF +++++ rm /tmp/tmp.5A1nfG1D8V /tmp/tmp.viay6f8YHF +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UiOvAuoVkf +++ mktemp ++ local LAST_ERR=/tmp/tmp.lJwd1pazrI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UiOvAuoVkf ++ cat /tmp/tmp.lJwd1pazrI ++ rm /tmp/tmp.UiOvAuoVkf /tmp/tmp.lJwd1pazrI ++ return 0 + [[ 2 == \2 ]] + compare_mysql_cmd_local select-3 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 '' pxc + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local postfix= + local container_name=pxc + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql_local 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 pxc + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local container_name=pxc + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-3.sql /tmp/tmp.SqFtpPvH1H/select-3.sql + desc 'test monitor' + set +o xtrace ----------------------------------------------------------------------------------- test monitor ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.hcDu6LY6EN ++ mktemp + local LAST_ERR=/tmp/tmp.jsyD838CwO + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.hcDu6LY6EN secret/my-cluster-secrets patched + cat /tmp/tmp.jsyD838CwO + rm /tmp/tmp.hcDu6LY6EN /tmp/tmp.jsyD838CwO + return 0 + wait_for_password_propagation my-cluster-secrets monitor + local secret=my-cluster-secrets + local user=monitor + local max_retry=240 ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.RMwdPadDiR +++ mktemp ++ local LAST_ERR=/tmp/tmp.Kvnky0tXHS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RMwdPadDiR ++ cat /tmp/tmp.Kvnky0tXHS ++ rm /tmp/tmp.RMwdPadDiR /tmp/tmp.Kvnky0tXHS ++ return 0 + local root_pass=test-password + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + echo 'Skipping dual password feature doesn'\''t work for 5.7. PXC 5.7 doesn'\''t support it!' Skipping dual password feature doesn't work for 5.7. PXC 5.7 doesn't support it! + return + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uqLbJ3dI11 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WJs8aEjdA8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uqLbJ3dI11 ++ cat /tmp/tmp.WJs8aEjdA8 ++ rm /tmp/tmp.uqLbJ3dI11 /tmp/tmp.WJs8aEjdA8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3G1PteiWc7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.RIjPj82LWi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3G1PteiWc7 ++ cat /tmp/tmp.RIjPj82LWi ++ rm /tmp/tmp.3G1PteiWc7 /tmp/tmp.RIjPj82LWi ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DgKwYoaxGT +++ mktemp ++ local LAST_ERR=/tmp/tmp.khOiGjhIDk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DgKwYoaxGT ++ cat /tmp/tmp.khOiGjhIDk ++ rm /tmp/tmp.DgKwYoaxGT /tmp/tmp.khOiGjhIDk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7uGGEyDgzW +++ mktemp ++ local LAST_ERR=/tmp/tmp.XLNWj0FNpp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7uGGEyDgzW ++ cat /tmp/tmp.XLNWj0FNpp ++ rm /tmp/tmp.7uGGEyDgzW /tmp/tmp.XLNWj0FNpp ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uQ26RHXb6F +++ mktemp ++ local LAST_ERR=/tmp/tmp.uEN38n2Oqh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uQ26RHXb6F ++ cat /tmp/tmp.uEN38n2Oqh ++ rm /tmp/tmp.uQ26RHXb6F /tmp/tmp.uEN38n2Oqh ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.NWv7zsPfPo ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.52tIJ8rHNl +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.NWv7zsPfPo +++++ cat /tmp/tmp.52tIJ8rHNl +++++ rm /tmp/tmp.NWv7zsPfPo /tmp/tmp.52tIJ8rHNl +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.LulppG2cAo ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.r12LW96fMu +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.LulppG2cAo +++++ cat /tmp/tmp.r12LW96fMu +++++ rm /tmp/tmp.LulppG2cAo /tmp/tmp.r12LW96fMu +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yPLPQaK4iE +++ mktemp ++ local LAST_ERR=/tmp/tmp.Cdx7jbGAB2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yPLPQaK4iE ++ cat /tmp/tmp.Cdx7jbGAB2 ++ rm /tmp/tmp.yPLPQaK4iE /tmp/tmp.Cdx7jbGAB2 ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MFlQjPpZf9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Yvgspu23nU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MFlQjPpZf9 ++ cat /tmp/tmp.Yvgspu23nU ++ rm /tmp/tmp.MFlQjPpZf9 /tmp/tmp.Yvgspu23nU ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql + desc 'test operator' + set +o xtrace ----------------------------------------------------------------------------------- test operator ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets operator dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=operator + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.L7mDcbz4Xi ++ mktemp + local LAST_ERR=/tmp/tmp.0dFAKdkiTT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L7mDcbz4Xi secret/my-cluster-secrets patched + cat /tmp/tmp.0dFAKdkiTT + rm /tmp/tmp.L7mDcbz4Xi /tmp/tmp.0dFAKdkiTT + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6uw08RFueZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.nQDfo9qg8A ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6uw08RFueZ ++ cat /tmp/tmp.nQDfo9qg8A ++ rm /tmp/tmp.6uw08RFueZ /tmp/tmp.nQDfo9qg8A ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f2cA6Wmy11 +++ mktemp ++ local LAST_ERR=/tmp/tmp.fdROP0579D ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.f2cA6Wmy11 ++ cat /tmp/tmp.fdROP0579D ++ rm /tmp/tmp.f2cA6Wmy11 /tmp/tmp.fdROP0579D ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WVveFYwYO0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.xhc5ZUgXcS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.WVveFYwYO0 ++ cat /tmp/tmp.xhc5ZUgXcS ++ rm /tmp/tmp.WVveFYwYO0 /tmp/tmp.xhc5ZUgXcS ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.ZWGOH8BpI9 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.eH5Pd0ESPw +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.ZWGOH8BpI9 +++++ cat /tmp/tmp.eH5Pd0ESPw +++++ rm /tmp/tmp.ZWGOH8BpI9 /tmp/tmp.eH5Pd0ESPw +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.vL56h5dFvj ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.5lM3U0vAgL +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.vL56h5dFvj +++++ cat /tmp/tmp.5lM3U0vAgL +++++ rm /tmp/tmp.vL56h5dFvj /tmp/tmp.5lM3U0vAgL +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XMcPWaNxfU +++ mktemp ++ local LAST_ERR=/tmp/tmp.yt8S9oAksz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XMcPWaNxfU ++ cat /tmp/tmp.yt8S9oAksz ++ rm /tmp/tmp.XMcPWaNxfU /tmp/tmp.yt8S9oAksz ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nBmSJtIKna +++ mktemp ++ local LAST_ERR=/tmp/tmp.3WWoTjtsoq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nBmSJtIKna ++ cat /tmp/tmp.3WWoTjtsoq ++ rm /tmp/tmp.nBmSJtIKna /tmp/tmp.3WWoTjtsoq ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql + desc 'change secret name' + set +o xtrace ----------------------------------------------------------------------------------- change secret name ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' ++ mktemp + local LAST_OUT=/tmp/tmp.rNEdgzispK ++ mktemp + local LAST_ERR=/tmp/tmp.YkWDlsX07G + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.rNEdgzispK perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.YkWDlsX07G + rm /tmp/tmp.rNEdgzispK /tmp/tmp.YkWDlsX07G + return 0 + sleep 30 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7PPX35ZBGP +++ mktemp ++ local LAST_ERR=/tmp/tmp.4i1vgyBHKn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7PPX35ZBGP ++ cat /tmp/tmp.4i1vgyBHKn ++ rm /tmp/tmp.7PPX35ZBGP /tmp/tmp.4i1vgyBHKn ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PK5e0hjedJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.lCj6lEigme ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PK5e0hjedJ ++ cat /tmp/tmp.lCj6lEigme ++ rm /tmp/tmp.PK5e0hjedJ /tmp/tmp.lCj6lEigme ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DI0PFJl3hi +++ mktemp ++ local LAST_ERR=/tmp/tmp.HnlYgRSNSu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DI0PFJl3hi ++ cat /tmp/tmp.HnlYgRSNSu ++ rm /tmp/tmp.DI0PFJl3hi /tmp/tmp.HnlYgRSNSu ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pnadUFV7Ix +++ mktemp ++ local LAST_ERR=/tmp/tmp.5EoaZ6uUqq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pnadUFV7Ix ++ cat /tmp/tmp.5EoaZ6uUqq ++ rm /tmp/tmp.pnadUFV7Ix /tmp/tmp.5EoaZ6uUqq ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JekUDP8IfJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.P92PCaiAzO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JekUDP8IfJ ++ cat /tmp/tmp.P92PCaiAzO ++ rm /tmp/tmp.JekUDP8IfJ /tmp/tmp.P92PCaiAzO ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BBFVbBp05P +++ mktemp ++ local LAST_ERR=/tmp/tmp.4LVr2uRCKI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BBFVbBp05P ++ cat /tmp/tmp.4LVr2uRCKI ++ rm /tmp/tmp.BBFVbBp05P /tmp/tmp.4LVr2uRCKI ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hEc2CEjS74 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8Uzb0CDN72 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hEc2CEjS74 ++ cat /tmp/tmp.8Uzb0CDN72 ++ rm /tmp/tmp.hEc2CEjS74 /tmp/tmp.8Uzb0CDN72 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vxo3bUABEo +++ mktemp ++ local LAST_ERR=/tmp/tmp.iTfl4dhAPv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Vxo3bUABEo ++ cat /tmp/tmp.iTfl4dhAPv ++ rm /tmp/tmp.Vxo3bUABEo /tmp/tmp.iTfl4dhAPv ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4te8Mq4TPi +++ mktemp ++ local LAST_ERR=/tmp/tmp.dM8TEA56be ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4te8Mq4TPi ++ cat /tmp/tmp.dM8TEA56be ++ rm /tmp/tmp.4te8Mq4TPi /tmp/tmp.dM8TEA56be ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.Tm1WsadC7H ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.mzey8UqJmc +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.Tm1WsadC7H +++++ cat /tmp/tmp.mzey8UqJmc +++++ rm /tmp/tmp.Tm1WsadC7H /tmp/tmp.mzey8UqJmc +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.Xj31hhCMJJ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.7ZBgZ2orOd +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.Xj31hhCMJJ +++++ cat /tmp/tmp.7ZBgZ2orOd +++++ rm /tmp/tmp.Xj31hhCMJJ /tmp/tmp.7ZBgZ2orOd +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hYrIoFWqNA +++ mktemp ++ local LAST_ERR=/tmp/tmp.I6wn5CUitq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hYrIoFWqNA ++ cat /tmp/tmp.I6wn5CUitq ++ rm /tmp/tmp.hYrIoFWqNA /tmp/tmp.I6wn5CUitq ++ return 0 + [[ 2 == \2 ]] + desc 'test new operator' + set +o xtrace ----------------------------------------------------------------------------------- test new operator ----------------------------------------------------------------------------------- + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + patch_secret my-cluster-secrets-2 operator dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets-2 + local key=operator + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.OufpcFPob7 ++ mktemp + local LAST_ERR=/tmp/tmp.0WXtpLp3Lq + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OufpcFPob7 secret/my-cluster-secrets-2 patched + cat /tmp/tmp.0WXtpLp3Lq + rm /tmp/tmp.OufpcFPob7 /tmp/tmp.0WXtpLp3Lq + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bASknkFH3l +++ mktemp ++ local LAST_ERR=/tmp/tmp.ugZFA0wADq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bASknkFH3l ++ cat /tmp/tmp.ugZFA0wADq ++ rm /tmp/tmp.bASknkFH3l /tmp/tmp.ugZFA0wADq ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CH8NyIJ8iP +++ mktemp ++ local LAST_ERR=/tmp/tmp.OXvNAZDNb7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CH8NyIJ8iP ++ cat /tmp/tmp.OXvNAZDNb7 ++ rm /tmp/tmp.CH8NyIJ8iP /tmp/tmp.OXvNAZDNb7 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FmtuZBMocy +++ mktemp ++ local LAST_ERR=/tmp/tmp.kAMM5vTSUF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FmtuZBMocy ++ cat /tmp/tmp.kAMM5vTSUF ++ rm /tmp/tmp.FmtuZBMocy /tmp/tmp.kAMM5vTSUF ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EVVbTcLwP4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.M1tjMMjwhR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EVVbTcLwP4 ++ cat /tmp/tmp.M1tjMMjwhR ++ rm /tmp/tmp.EVVbTcLwP4 /tmp/tmp.M1tjMMjwhR ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.wQfGZcvx5c ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.jO4rMcv3Pe +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.wQfGZcvx5c +++++ cat /tmp/tmp.jO4rMcv3Pe +++++ rm /tmp/tmp.wQfGZcvx5c /tmp/tmp.jO4rMcv3Pe +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.1c6PNFTcs8 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.lQOXtJJCrk +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.1c6PNFTcs8 +++++ cat /tmp/tmp.lQOXtJJCrk +++++ rm /tmp/tmp.1c6PNFTcs8 /tmp/tmp.lQOXtJJCrk +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PHqjzWWFNJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.HZQkC2NdRd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PHqjzWWFNJ ++ cat /tmp/tmp.HZQkC2NdRd ++ rm /tmp/tmp.PHqjzWWFNJ /tmp/tmp.HZQkC2NdRd ++ return 0 + [[ 2 == \2 ]] + sleep 20 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9QAVTpFx7O +++ mktemp ++ local LAST_ERR=/tmp/tmp.BTiDfkyNTK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9QAVTpFx7O ++ cat /tmp/tmp.BTiDfkyNTK ++ rm /tmp/tmp.9QAVTpFx7O /tmp/tmp.BTiDfkyNTK ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql ++ getSecretData my-cluster-secrets-2 root ++ local secretName=my-cluster-secrets-2 ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.acuVSxjAPK +++ mktemp ++ local LAST_ERR=/tmp/tmp.o0s22IKkWT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.acuVSxjAPK ++ cat /tmp/tmp.o0s22IKkWT ++ rm /tmp/tmp.acuVSxjAPK /tmp/tmp.o0s22IKkWT ++ return 0 + newpass='[n,dPQt6?j5q}}[rr~S' + desc 'test new users sync' + set +o xtrace ----------------------------------------------------------------------------------- test new users sync ----------------------------------------------------------------------------------- + run_mysql 'CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''[n,dPQt6?j5q}}[rr~S'\'';' '-h some-name-pxc -uroot -p'\''[n,dPQt6?j5q}}[rr~S'\''' + local 'command=CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''[n,dPQt6?j5q}}[rr~S'\'';' + local 'uri=-h some-name-pxc -uroot -p'\''[n,dPQt6?j5q}}[rr~S'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nWLtssTOyc +++ mktemp ++ local LAST_ERR=/tmp/tmp.PAxBVufPVt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nWLtssTOyc ++ cat /tmp/tmp.PAxBVufPVt ++ rm /tmp/tmp.nWLtssTOyc /tmp/tmp.PAxBVufPVt ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + sleep 40 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''[n,dPQt6?j5q}}[rr~S'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''[n,dPQt6?j5q}}[rr~S'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''[n,dPQt6?j5q}}[rr~S'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''[n,dPQt6?j5q}}[rr~S'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Uu3pyz6ItS +++ mktemp ++ local LAST_ERR=/tmp/tmp.r42pj8F8L2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Uu3pyz6ItS ++ cat /tmp/tmp.r42pj8F8L2 ++ rm /tmp/tmp.Uu3pyz6ItS /tmp/tmp.r42pj8F8L2 ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql ++ getSecretData internal-some-name operator ++ local secretName=internal-some-name ++ local dataKey=operator ++ kubectl_bin get secrets/internal-some-name '--template={{.data.operator}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.Hj7wdiSKNd +++ mktemp ++ local LAST_ERR=/tmp/tmp.vzOiqQ38YD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/internal-some-name '--template={{.data.operator}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Hj7wdiSKNd ++ cat /tmp/tmp.vzOiqQ38YD ++ rm /tmp/tmp.Hj7wdiSKNd /tmp/tmp.vzOiqQ38YD ++ return 0 + pass=test-password2 + desc 'check secret without operator' + set +o xtrace ----------------------------------------------------------------------------------- check secret without operator ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.mzZYTIbuDF ++ mktemp + local LAST_ERR=/tmp/tmp.N0MSPNZoQn + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mzZYTIbuDF secret/my-cluster-secrets-2 configured + cat /tmp/tmp.N0MSPNZoQn Warning: resource secrets/my-cluster-secrets-2 is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.mzZYTIbuDF /tmp/tmp.N0MSPNZoQn + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HTRcG8Jhap +++ mktemp ++ local LAST_ERR=/tmp/tmp.9TzGY4tf5K ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HTRcG8Jhap ++ cat /tmp/tmp.9TzGY4tf5K ++ rm /tmp/tmp.HTRcG8Jhap /tmp/tmp.9TzGY4tf5K ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-4.sql /tmp/tmp.SqFtpPvH1H/select-4.sql + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/conf/some-name.yml ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1774-70b9684b#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.PKT9a4UEJy + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-14210~ + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' ++ mktemp + local LAST_ERR=/tmp/tmp.PIPFDXlnNL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PKT9a4UEJy perconaxtradbcluster.pxc.percona.com/some-name configured + cat /tmp/tmp.PIPFDXlnNL + rm /tmp/tmp.PKT9a4UEJy /tmp/tmp.PIPFDXlnNL + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WUzsNkI5IA +++ mktemp ++ local LAST_ERR=/tmp/tmp.lxIFyjQCtE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.WUzsNkI5IA ++ cat /tmp/tmp.lxIFyjQCtE ++ rm /tmp/tmp.WUzsNkI5IA /tmp/tmp.lxIFyjQCtE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zJiqG5Aw54 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZoihFL2stY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zJiqG5Aw54 ++ cat /tmp/tmp.ZoihFL2stY ++ rm /tmp/tmp.zJiqG5Aw54 /tmp/tmp.ZoihFL2stY ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3jbsOs5NL9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.FzOSIf5eW5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3jbsOs5NL9 ++ cat /tmp/tmp.FzOSIf5eW5 ++ rm /tmp/tmp.3jbsOs5NL9 /tmp/tmp.FzOSIf5eW5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8zaSbuYyDF +++ mktemp ++ local LAST_ERR=/tmp/tmp.YZDUiaQXro ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8zaSbuYyDF ++ cat /tmp/tmp.YZDUiaQXro ++ rm /tmp/tmp.8zaSbuYyDF /tmp/tmp.YZDUiaQXro ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.S7ZS262bo6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.kmoTIR0UVG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.S7ZS262bo6 ++ cat /tmp/tmp.kmoTIR0UVG ++ rm /tmp/tmp.S7ZS262bo6 /tmp/tmp.kmoTIR0UVG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3gT73fNvO7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.4B9J4LAFOs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3gT73fNvO7 ++ cat /tmp/tmp.4B9J4LAFOs ++ rm /tmp/tmp.3gT73fNvO7 /tmp/tmp.4B9J4LAFOs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZP6LdjfMR3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.CW7zRv5EGz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZP6LdjfMR3 ++ cat /tmp/tmp.CW7zRv5EGz ++ rm /tmp/tmp.ZP6LdjfMR3 /tmp/tmp.CW7zRv5EGz ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NrdWCYTwvu +++ mktemp ++ local LAST_ERR=/tmp/tmp.8noPoQzZma ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NrdWCYTwvu ++ cat /tmp/tmp.8noPoQzZma ++ rm /tmp/tmp.NrdWCYTwvu /tmp/tmp.8noPoQzZma ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1vXAyhAgz0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Qs7Y8wU3xM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1vXAyhAgz0 ++ cat /tmp/tmp.Qs7Y8wU3xM ++ rm /tmp/tmp.1vXAyhAgz0 /tmp/tmp.Qs7Y8wU3xM ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.wG5hDoA12C ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.ejnLsmpmX5 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.wG5hDoA12C +++++ cat /tmp/tmp.ejnLsmpmX5 +++++ rm /tmp/tmp.wG5hDoA12C /tmp/tmp.ejnLsmpmX5 +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HjbcIEg60b +++ mktemp ++ local LAST_ERR=/tmp/tmp.Tj8Bk5e72v ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HjbcIEg60b ++ cat /tmp/tmp.Tj8Bk5e72v ++ rm /tmp/tmp.HjbcIEg60b /tmp/tmp.Tj8Bk5e72v ++ return 0 + [[ 3 == \3 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + check_generation 2 haproxy some-name + local generation=2 + local container=haproxy + local cluster=some-name + local current_generation ++ kubectl_bin get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ofEdfrA1FX +++ mktemp ++ local LAST_ERR=/tmp/tmp.VTPJTNqnp9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ofEdfrA1FX ++ cat /tmp/tmp.VTPJTNqnp9 ++ rm /tmp/tmp.ofEdfrA1FX /tmp/tmp.VTPJTNqnp9 ++ return 0 + current_generation=2 + [[ 2 != \2 ]] + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.WpGKtPsb63 ++ mktemp + local LAST_ERR=/tmp/tmp.ByQdqSulO5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WpGKtPsb63 secret/my-cluster-secrets patched + cat /tmp/tmp.ByQdqSulO5 + rm /tmp/tmp.WpGKtPsb63 /tmp/tmp.ByQdqSulO5 + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JQ8xr7MZD3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.BWH1Q39WGw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JQ8xr7MZD3 ++ cat /tmp/tmp.BWH1Q39WGw ++ rm /tmp/tmp.JQ8xr7MZD3 /tmp/tmp.BWH1Q39WGw ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.k8czVg9fGs +++ mktemp ++ local LAST_ERR=/tmp/tmp.k5R8zJH1qm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.k8czVg9fGs ++ cat /tmp/tmp.k5R8zJH1qm ++ rm /tmp/tmp.k8czVg9fGs /tmp/tmp.k5R8zJH1qm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fKdfgz9xYn +++ mktemp ++ local LAST_ERR=/tmp/tmp.EFS71YbKN5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fKdfgz9xYn ++ cat /tmp/tmp.EFS71YbKN5 ++ rm /tmp/tmp.fKdfgz9xYn /tmp/tmp.EFS71YbKN5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8bFUSSrvRx +++ mktemp ++ local LAST_ERR=/tmp/tmp.xYk0qMz02O ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8bFUSSrvRx ++ cat /tmp/tmp.xYk0qMz02O ++ rm /tmp/tmp.8bFUSSrvRx /tmp/tmp.xYk0qMz02O ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C2IVQlmhNx +++ mktemp ++ local LAST_ERR=/tmp/tmp.gLsGN3WoQ6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.C2IVQlmhNx ++ cat /tmp/tmp.gLsGN3WoQ6 ++ rm /tmp/tmp.C2IVQlmhNx /tmp/tmp.gLsGN3WoQ6 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.DwaYK52q4S ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.9rEPeIiAAf +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.DwaYK52q4S +++++ cat /tmp/tmp.9rEPeIiAAf +++++ rm /tmp/tmp.DwaYK52q4S /tmp/tmp.9rEPeIiAAf +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pHX87Lof7t +++ mktemp ++ local LAST_ERR=/tmp/tmp.wkiF2RNO5U ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pHX87Lof7t ++ cat /tmp/tmp.wkiF2RNO5U ++ rm /tmp/tmp.pHX87Lof7t /tmp/tmp.wkiF2RNO5U ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd select-3 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + run_mysql 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zJJ4oTOdv2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.q7qdVDhbXJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zJJ4oTOdv2 ++ cat /tmp/tmp.q7qdVDhbXJ ++ rm /tmp/tmp.zJJ4oTOdv2 /tmp/tmp.q7qdVDhbXJ ++ return 0 + client_pod=pxc-client-7b7f8bcff9-psjwv + wait_pod pxc-client-7b7f8bcff9-psjwv + local pod=pxc-client-7b7f8bcff9-psjwv + local max_retry=480 + local ns= ++ echo pxc-client-7b7f8bcff9-psjwv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7b7f8bcff9-psjwv condition met pxc-client-7b7f8bcff9-psjwv.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.SqFtpPvH1H/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1774/e2e-tests/users/compare/select-3.sql /tmp/tmp.SqFtpPvH1H/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + check_generation 3 haproxy some-name + local generation=3 + local container=haproxy + local cluster=some-name + local current_generation ++ kubectl_bin get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fvvFo5HorE +++ mktemp ++ local LAST_ERR=/tmp/tmp.a5E6hdnFj9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fvvFo5HorE ++ cat /tmp/tmp.a5E6hdnFj9 ++ rm /tmp/tmp.fvvFo5HorE /tmp/tmp.a5E6hdnFj9 ++ return 0 + current_generation=3 + [[ 3 != \3 ]] + destroy users-14210 + local namespace=users-14210 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info + grep -v 'the object has been modified' + grep -v 'get backup status: Job.batch' + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + sort -u + tee /tmp/tmp.SqFtpPvH1H/operator.log ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.X07T4SHdw6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.4NMhGs3uVj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.X07T4SHdw6 ++ cat /tmp/tmp.4NMhGs3uVj ++ rm /tmp/tmp.X07T4SHdw6 /tmp/tmp.4NMhGs3uVj ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-56bc5d9fb9-sg56h ++ mktemp + local LAST_OUT=/tmp/tmp.umvNXG3Gur ++ mktemp + local LAST_ERR=/tmp/tmp.PKLQ08cg89 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-56bc5d9fb9-sg56h + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.umvNXG3Gur + cat /tmp/tmp.PKLQ08cg89 + rm /tmp/tmp.umvNXG3Gur /tmp/tmp.PKLQ08cg89 + return 0 2024-08-02T16:09:12.064Z INFO setup Manager starting up {"gitCommit": "70b9684b9628ddfcc3dab7c6787cbf6d29753b3d", "gitBranch": "PR-1774-70b9684b", "buildTime": "2024-08-02T13:47:32Z", "goVersion": "go1.22.5", "os": "linux", "arch": "amd64"} 2024-08-02T16:09:12.064Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.27.16-gke.1008000"} 2024-08-02T16:09:12.065Z INFO setup Registering Components. 2024-08-02T16:09:16.948Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-08-02T16:09:16.960Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-08-02T16:09:16.960Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-08-02T16:09:16.960Z INFO controller-runtime.metrics Starting metrics server 2024-08-02T16:09:16.960Z INFO controller-runtime.webhook Starting webhook server 2024-08-02T16:09:16.960Z INFO setup Starting the Cmd. 2024-08-02T16:09:16.960Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-08-02T16:09:16.961Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-08-02T16:09:16.961Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-08-02T16:09:17.260Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-08-02T16:09:33.758Z DEBUG events percona-xtradb-cluster-operator-56bc5d9fb9-sg56h_9545a760-b4c9-4cb8-a27c-6a33139044cc became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"0c12ddc9-14bb-4de1-97fa-b2f21917942a","apiVersion":"coordination.k8s.io/v1","resourceVersion":"87802"}, "reason": "LeaderElection"} 2024-08-02T16:09:33.758Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-08-02T16:09:33.758Z INFO Starting Controller {"controller": "pxc-controller"} 2024-08-02T16:09:33.758Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-08-02T16:09:33.758Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2024-08-02T16:09:33.758Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2024-08-02T16:09:33.758Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2024-08-02T16:09:33.758Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-08-02T16:09:33.979Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-08-02T16:09:33.979Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-08-02T16:09:33.979Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-08-02T16:10:21.553Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "61bb02e4-3274-4e60-a59f-e3cd1ded99bb", "err": "get primary pxc pod: failed to get proxy connection: dial tcp: lookup some-name-proxysql-unready.users-14210: i/o timeout"} 2024-08-02T16:10:46.684Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "0282bd85-43e2-45f8-874b-196c9e285c64", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210: i/o timeout"} 2024-08-02T16:12:30.972Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "229b6416-e820-41b0-882a-9fda3aa1679e"} 2024-08-02T16:12:35.732Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "554bbe03-ffca-44b7-837c-184b37fd6d72"} 2024-08-02T16:12:40.935Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "984819a1-96d4-45e5-bec1-6c5f2d6ce10f"} 2024-08-02T16:12:43.172Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "user": "monitor"} 2024-08-02T16:12:43.197Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "user": "monitor"} 2024-08-02T16:12:43.207Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "secret": "some-name-mysql-init", "user": "monitor"} 2024-08-02T16:12:43.248Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "user": "monitor"} 2024-08-02T16:12:43.259Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "user": "monitor"} 2024-08-02T16:12:43.259Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "last-applied-secret": "4e3282050745046d5044e0fcb5f2bf140d7320a1256a79c8ca2184f38f4f3098"} 2024-08-02T16:12:43.291Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "object": "some-name-proxysql"} 2024-08-02T16:12:45.984Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "eb7260ec-1e91-4c43-a667-4d0bf3f6277e", "error": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / ", "errorVerbose": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:13:54.623Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "8cd93bdb-8b3c-42ce-8cdb-4be9e7485fb3"} 2024-08-02T16:13:59.337Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "058260b2-6732-47b5-ad6d-255d14c01694"} 2024-08-02T16:14:04.414Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "6a7d98d6-02dd-4003-aca9-34185ed2471e"} 2024-08-02T16:14:09.533Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "64faa4ed-9b42-4926-ae3c-0f8340cca6e5"} 2024-08-02T16:14:11.536Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "user": "operator"} 2024-08-02T16:14:11.558Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "user": "operator"} 2024-08-02T16:14:11.567Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "secret": "some-name-mysql-init", "user": "operator"} 2024-08-02T16:14:11.579Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "user": "operator"} 2024-08-02T16:14:11.579Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-08-02T16:14:11.641Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "object": "some-name-proxysql"} 2024-08-02T16:14:12.752Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4b7534b7-2f3f-42fe-a52d-83e2d634512a", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:14:46.333Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "aed83521-4270-493b-bb48-ecd3bfe070ab"} 2024-08-02T16:14:54.595Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "1bcba816-865b-46ab-82e9-286607af4c25"} 2024-08-02T16:14:59.595Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "6975d08a-06a2-4165-ad15-a8b20683d8b9"} 2024-08-02T16:15:04.725Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "fbf4e921-7bcb-451c-9def-b674f6797f5f"} 2024-08-02T16:15:09.894Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "b375eaf3-ce4c-4651-aea0-b3f9846a92fa"} 2024-08-02T16:15:12.254Z INFO Created user secrets {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secrets": "my-cluster-secrets-2"} 2024-08-02T16:15:12.254Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "root"} 2024-08-02T16:15:12.287Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "root"} 2024-08-02T16:15:12.298Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secret": "some-name-mysql-init", "user": "root"} 2024-08-02T16:15:21.817Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "87840afd-b44e-4838-bc25-165331590721"} 2024-08-02T16:15:22.264Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103"} 2024-08-02T16:15:22.276Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "root"} 2024-08-02T16:15:22.276Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "operator"} 2024-08-02T16:15:22.298Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "operator"} 2024-08-02T16:15:22.308Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secret": "some-name-mysql-init", "user": "operator"} 2024-08-02T16:15:22.320Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "operator"} 2024-08-02T16:15:22.320Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "monitor"} 2024-08-02T16:15:22.344Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "monitor"} 2024-08-02T16:15:22.356Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secret": "some-name-mysql-init", "user": "monitor"} 2024-08-02T16:15:22.399Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "monitor"} 2024-08-02T16:15:22.411Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "monitor"} 2024-08-02T16:15:22.411Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "xtrabackup"} 2024-08-02T16:15:22.438Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "xtrabackup"} 2024-08-02T16:15:22.453Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-08-02T16:15:22.464Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "xtrabackup"} 2024-08-02T16:15:22.464Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "replication"} 2024-08-02T16:15:22.491Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "replication"} 2024-08-02T16:15:22.501Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "secret": "some-name-mysql-init", "user": "replication"} 2024-08-02T16:15:22.510Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "replication"} 2024-08-02T16:15:22.510Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "proxyadmin"} 2024-08-02T16:15:22.555Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "proxyadmin"} 2024-08-02T16:15:22.568Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "user": "proxyadmin"} 2024-08-02T16:15:22.568Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "last-applied-secret": "269fbfb80a3764ba6f4603ea8e09e7dfa3bd0c4835813aa5e5e1c09d42f170a4"} 2024-08-02T16:15:22.568Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "last-applied-secret": "269fbfb80a3764ba6f4603ea8e09e7dfa3bd0c4835813aa5e5e1c09d42f170a4"} 2024-08-02T16:15:22.598Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "object": "some-name-pxc"} 2024-08-02T16:15:22.642Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "object": "some-name-proxysql"} 2024-08-02T16:15:22.839Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "88374602-634a-4f4f-8383-378913885103", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:17:06.636Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "16771ab8-61f5-48f9-a3ba-1af092589705", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210 on 10.255.16.10:53: no such host"} 2024-08-02T16:17:07.000Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "7ff9ad4a-f068-4635-a55f-8d236620afc5", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210 on 10.255.16.10:53: no such host"} 2024-08-02T16:17:17.216Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "e71ac34b-1cdf-4b3a-ad05-3cf9ec2c042a", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210 on 10.255.16.10:53: no such host"} 2024-08-02T16:17:22.335Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "9ad00315-082d-4c30-b57c-843743e02bb2", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:27.485Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "6ac720d7-ebba-485b-9554-db49c44a2589", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:32.585Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "f10a3798-d80a-4689-a1d8-97c8521b97f2", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:37.690Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "723ffe81-21cf-4944-b35f-8e9da2264e7b", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:42.800Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "116c2828-44cb-4c05-b7d4-86b75d6ee108", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:47.927Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "9769fc6f-dd42-4edc-90f1-0a8ef371bdee", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:53.039Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "f3bd29e1-254f-4f1c-b24d-8549de5250c0", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:17:58.171Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "fbd40868-1bb0-4ab2-9c2f-b695ca197286", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:18:06.612Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "5008a007-2866-47ff-aabc-d0eca25c78eb"} 2024-08-02T16:18:11.607Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "caaeb007-303d-48d2-ba36-5bb22dee3f18"} 2024-08-02T16:18:16.804Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "cd0a5cd3-f557-41fe-a17a-b0a2ba8b54a5"} 2024-08-02T16:18:22.504Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "3042d9ac-6c2e-478d-8cef-ab4c404edb07"} 2024-08-02T16:18:24.154Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "user": "operator"} 2024-08-02T16:18:24.183Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "user": "operator"} 2024-08-02T16:18:24.192Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "secret": "some-name-mysql-init", "user": "operator"} 2024-08-02T16:18:24.205Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "user": "operator"} 2024-08-02T16:18:24.205Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "last-applied-secret": "9a48e4bbf3400a85d5da33184f0c5e920f34fa10e3453da6a0517ec814d0cc81"} 2024-08-02T16:18:24.233Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "object": "some-name-proxysql"} 2024-08-02T16:18:25.601Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "dd8f8bc9-a865-4319-ad48-f1cba861f91d", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:19:14.789Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "1244be36-7a8b-4d11-a4a0-534285f7a6e6"} 2024-08-02T16:19:18.142Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "c43a0bee-a95c-4b2e-b86e-bd9fdaf881c6"} 2024-08-02T16:19:23.801Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "46581d90-1e3e-42bd-a673-e8b134c9ea08"} 2024-08-02T16:19:28.872Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "b06c9816-8120-462b-aadd-d037c63d632a"} 2024-08-02T16:19:34.046Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "0cda242e-0fba-41c8-bbc3-e075637ba71f"} 2024-08-02T16:19:39.190Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "29ead623-11fd-4852-885f-2a8357e485bf"} 2024-08-02T16:19:44.345Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "09aec180-9104-4caa-945c-92a1d3266192"} 2024-08-02T16:19:49.441Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "6a294a61-15d4-4ec8-94b6-494fb24c5e1c"} 2024-08-02T16:19:54.632Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "48072f48-930d-40a9-826a-2e794db1efad"} 2024-08-02T16:20:01.486Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "a4733780-be9a-4c38-b6a3-859a8bc38b21"} 2024-08-02T16:20:05.249Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "b44cacea-05dd-44d6-87d8-7a1fca4a2754"} 2024-08-02T16:20:10.303Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "cbf5b241-35f6-4a91-a451-6b0743802726"} 2024-08-02T16:20:15.441Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "fb2e0518-83f5-43b0-94e6-5f4e083dd28d"} 2024-08-02T16:20:20.627Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "361f6af1-1252-45ac-8be5-f34d87c6d180"} 2024-08-02T16:20:25.741Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4c3d1746-1257-4375-bc08-83242e013836"} 2024-08-02T16:20:30.989Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "895d2e6d-bf2b-4526-b773-5a0b6b5ff951"} 2024-08-02T16:20:36.200Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "29ddee99-bb5b-4f43-a503-a1a947724d57"} 2024-08-02T16:20:41.342Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "95cf856a-5dfe-412e-9170-c62a06ad9039"} 2024-08-02T16:20:46.491Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "25eec36e-c0a6-4b9f-a30f-71614f2b9f97"} 2024-08-02T16:20:48.455Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "root"} 2024-08-02T16:20:48.490Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "root"} 2024-08-02T16:20:48.500Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "secret": "some-name-mysql-init", "user": "root"} 2024-08-02T16:20:53.555Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005"} 2024-08-02T16:20:53.563Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "root"} 2024-08-02T16:20:53.563Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "monitor"} 2024-08-02T16:20:53.585Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "monitor"} 2024-08-02T16:20:53.593Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "secret": "some-name-mysql-init", "user": "monitor"} 2024-08-02T16:20:53.638Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "monitor"} 2024-08-02T16:20:53.648Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "monitor"} 2024-08-02T16:20:53.648Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "xtrabackup"} 2024-08-02T16:20:53.669Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "xtrabackup"} 2024-08-02T16:20:53.680Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-08-02T16:20:53.698Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "xtrabackup"} 2024-08-02T16:20:53.698Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "proxyadmin"} 2024-08-02T16:20:53.743Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "proxyadmin"} 2024-08-02T16:20:53.753Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "user": "proxyadmin"} 2024-08-02T16:20:53.753Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "last-applied-secret": "9707a487427aeaa6a777c85a964208fc8bb31b4818db1e8504261bc73bcea546"} 2024-08-02T16:20:53.753Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "last-applied-secret": "9707a487427aeaa6a777c85a964208fc8bb31b4818db1e8504261bc73bcea546"} 2024-08-02T16:20:53.773Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "object": "some-name-pxc"} 2024-08-02T16:20:53.810Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "object": "some-name-proxysql"} 2024-08-02T16:20:54.001Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "db5caed4-2b1c-49c0-969d-f7383eb73005", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:22:27.581Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "c811bd2b-2638-41e1-a65e-1013ebf26be0", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210 on 10.255.16.10:53: no such host"} 2024-08-02T16:22:32.611Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "0c7e5179-e5a2-4ab1-8475-86702f0f6504", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-14210 on 10.255.16.10:53: no such host"} 2024-08-02T16:22:48.059Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "24621718-5233-41a1-9823-3c384adacd12", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:22:53.176Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "c7815516-9828-43d0-85d9-df7fd19bbb26", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:22:58.271Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "c0f997c9-f342-4308-9574-1b5a364a6791", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:23:03.370Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "2dc473a8-21ed-460c-956c-a9fedb4dd000", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:23:08.493Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "1f26239f-2b56-4fe1-88b3-00e340894523", "primary name": "some-name-pxc-0.some-name-pxc.users-14210.svc.cluster.local"} 2024-08-02T16:23:16.999Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "bd3eb0ac-00bf-4b72-bb3f-a3a941f2bd82"} 2024-08-02T16:23:19.212Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "root"} 2024-08-02T16:23:19.248Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "root"} 2024-08-02T16:23:19.260Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "secret": "some-name-mysql-init", "user": "root"} 2024-08-02T16:23:19.274Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "root"} 2024-08-02T16:23:19.274Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "operator"} 2024-08-02T16:23:19.296Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "operator"} 2024-08-02T16:23:19.308Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "secret": "some-name-mysql-init", "user": "operator"} 2024-08-02T16:23:19.319Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "operator"} 2024-08-02T16:23:19.319Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "monitor"} 2024-08-02T16:23:19.340Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "monitor"} 2024-08-02T16:23:19.350Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "secret": "some-name-mysql-init", "user": "monitor"} 2024-08-02T16:23:19.359Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "monitor"} 2024-08-02T16:23:19.359Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "xtrabackup"} 2024-08-02T16:23:19.380Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "xtrabackup"} 2024-08-02T16:23:19.391Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-08-02T16:23:19.399Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "xtrabackup"} 2024-08-02T16:23:19.399Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "replication"} 2024-08-02T16:23:19.426Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "replication"} 2024-08-02T16:23:19.435Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "secret": "some-name-mysql-init", "user": "replication"} 2024-08-02T16:23:19.442Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "user": "replication"} 2024-08-02T16:23:19.443Z INFO HAProxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-08-02T16:23:19.443Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-08-02T16:23:19.445Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-pxc"} 2024-08-02T16:23:19.502Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-pxc"} 2024-08-02T16:23:19.697Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-pxc"} 2024-08-02T16:23:19.829Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-haproxy"} 2024-08-02T16:23:19.930Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-haproxy"} 2024-08-02T16:23:19.972Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-haproxy"} 2024-08-02T16:23:20.063Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "object": "some-name-haproxy-replicas"} 2024-08-02T16:23:20.277Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "0d3fec5f-931f-4665-8097-e6fa83cdd4f7", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-14210.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1240\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-08-02T16:23:20.348Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: 54449e71-5986-40b7-ad59-668d5bd916cf 2024-08-02T16:23:23.707Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "745b9eff-3027-4c5c-a726-ca1f6b71363f", "err": "get primary pxc pod: failed to get proxy connection: dial tcp 10.255.18.66:3306: connect: connection refused"} 2024-08-02T16:23:23.860Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "960a6602-d2e4-4086-a460-b33ee3953a9d", "object": "some-name-haproxy"} 2024-08-02T16:26:15.784Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "user": "monitor"} 2024-08-02T16:26:15.804Z INFO User password updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "user": "monitor"} 2024-08-02T16:26:15.817Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "secret": "some-name-mysql-init", "user": "monitor"} 2024-08-02T16:26:15.832Z INFO HAProxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "last-applied-secret": "81935ecf30ae523a6ee69582354f9488d47dbeb0f8c7c572af96870f2024284d"} 2024-08-02T16:26:15.832Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "user": "monitor"} 2024-08-02T16:26:15.875Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-14210", "name": "some-name", "reconcileID": "4df31dd1-931e-4d96-8760-4b71c416ca49", "object": "some-name-haproxy"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1242 [mysql] 2024/08/02 16:26:26 connection.go:49: unexpected EOF [mysql] 2024/08/02 16:26:31 connection.go:49: unexpected EOF + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE + kubectl patch pxc -n users-14210 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.QvbUEuP4h0 ++ mktemp + local LAST_ERR=/tmp/tmp.H6aVZK0Les + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.QvbUEuP4h0 perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.H6aVZK0Les + rm /tmp/tmp.QvbUEuP4h0 /tmp/tmp.H6aVZK0Les + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.RKZqbB3373 ++ mktemp + local LAST_ERR=/tmp/tmp.DGk89mdN69 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RKZqbB3373 No resources found + cat /tmp/tmp.DGk89mdN69 + rm /tmp/tmp.RKZqbB3373 /tmp/tmp.DGk89mdN69 + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.s1Zuz3v5zf ++ mktemp + local LAST_ERR=/tmp/tmp.Q5bguyOmDk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.s1Zuz3v5zf No resources found + cat /tmp/tmp.Q5bguyOmDk + rm /tmp/tmp.s1Zuz3v5zf /tmp/tmp.Q5bguyOmDk + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.ceQJ9W2Srv ++ mktemp + local LAST_ERR=/tmp/tmp.uCXY7AEh2C + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ceQJ9W2Srv validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.uCXY7AEh2C + rm /tmp/tmp.ceQJ9W2Srv /tmp/tmp.uCXY7AEh2C + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace users-14210 + rm -rf /tmp/tmp.SqFtpPvH1H + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.D6EqSPrmM3 + desc 'test passed' + local LAST_OUT=/tmp/tmp.ijMmesjGaN + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.if7cifTgTy + local exit_status=0 + local LAST_ERR=/tmp/tmp.yyhOSFvsgI + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace users-14210