Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/logs/upgrade-proxysql-5-7.log Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 + CLUSTER=upgrade-proxysql + CLUSTER_SIZE=3 + TARGET_OPERATOR_VER=1.19.0 + TARGET_IMAGE=perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 + TARGET_IMAGE_PXC=perconalab/percona-xtradb-cluster-operator:main-pxc5.7 + TARGET_IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest + TARGET_IMAGE_PROXY=perconalab/percona-xtradb-cluster-operator:main-proxysql + TARGET_IMAGE_HAPROXY=perconalab/percona-xtradb-cluster-operator:main-haproxy + TARGET_IMAGE_BACKUP=perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup + TARGET_IMAGE_LOGCOLLECTOR=perconalab/percona-xtradb-cluster-operator:main-logcollector + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 == *\p\e\r\c\o\n\a\-\x\t\r\a\d\b\-\c\l\u\s\t\e\r\-\o\p\e\r\a\t\o\r* ]] ++ echo -n perconalab/percona-xtradb-cluster-operator:main-pxc5.7 ++ /usr/bin/sed -r 's/.*([0-9].[0-9])$/\1/' + PXC_VER=5.7 ++ curl -s https://check.percona.com/versions/v1/pxc-operator ++ jq -r '.versions[].operator' ++ sort -V ++ tail -n1 + INIT_OPERATOR_VER=1.18.0 + [[ 1.18.0 == \1\.\1\9\.\0 ]] + GIT_TAG=v1.18.0 ++ curl -s 'https://check.percona.com/versions/v1/pxc-operator/1.18.0/latest?databaseVersion=5.7' + INIT_OPERATOR_IMAGES='{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' + OPERATOR_NAME=percona-xtradb-cluster-operator ++ jq -r '.versions[].matrix.operator[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' + IMAGE=percona/percona-xtradb-cluster-operator:1.18.0 ++ echo perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 ++ cut -d/ -f1 + [[ perconalab == \p\e\r\c\o\n\a\l\a\b ]] + IMAGE=perconalab/percona-xtradb-cluster-operator:1.18.0 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.pxc[].imagePath' + IMAGE_PXC=percona/percona-xtradb-cluster:5.7.44-31.65 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.pmm[].imagePath' ++ tail -n1 + IMAGE_PMM_CLIENT=percona/pmm-client:3.3.1 ++ jq -r '.versions[].matrix.proxysql[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' + IMAGE_PROXY=percona/proxysql2:2.7.3 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.haproxy[].imagePath' + IMAGE_HAPROXY=percona/haproxy:2.8.15 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.backup[].imagePath' + IMAGE_BACKUP=percona/percona-xtrabackup:2.4.29 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.18.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"","status":"recommended","critical":false},"3.3.1":{"imagePath":"percona/pmm-client:3.3.1","imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4","imageHashArm64":"","status":"recommended","critical":false}},"proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3","imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567","imageHashArm64":"","status":"recommended","critical":false}},"haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15","imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006","imageHashArm64":"","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0","imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85","imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356","status":"recommended","critical":false}},"logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1","imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779","imageHashArm64":"","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.logCollector[].imagePath' + IMAGE_LOGCOLLECTOR=percona/fluentbit:4.0.1 + [[ -n '' ]] + [[ 1.19.0 == \1\.\1\8\.\0 ]] + main + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.Tblhyhefkf ++ mktemp + local LAST_ERR=/tmp/tmp.mW4rkXnsrW + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Tblhyhefkf namespace/cert-manager created + cat /tmp/tmp.mW4rkXnsrW + rm /tmp/tmp.Tblhyhefkf /tmp/tmp.mW4rkXnsrW + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.dD35bqFcep ++ mktemp + local LAST_ERR=/tmp/tmp.j7NgO15k4W + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.dD35bqFcep namespace/cert-manager labeled + cat /tmp/tmp.j7NgO15k4W + rm /tmp/tmp.dD35bqFcep /tmp/tmp.j7NgO15k4W + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.pICRaOHNHZ ++ mktemp + local LAST_ERR=/tmp/tmp.7zOiYQE4rN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.pICRaOHNHZ namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.7zOiYQE4rN Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.pICRaOHNHZ /tmp/tmp.7zOiYQE4rN + return 0 + '[' '' == 4.10 ']' + sleep 70 + create_infra_gh upgrade-proxysql-31261 v1.18.0 + local ns=upgrade-proxysql-31261 + local git_tag=v1.18.0 + '[' -n pxc-operator ']' + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep validate-auth + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + egrep -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.DFn2UvUGQh ++ mktemp + local LAST_OUT=/tmp/tmp.aEr1N25PIJ ++ mktemp + local LAST_ERR=/tmp/tmp.lAnIomxedt + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.QB1dkD3onQ + local exit_status=0 + for i in '$(seq 0 2)' ++ seq 0 2 + set +e + kubectl delete namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.aEr1N25PIJ + cat /tmp/tmp.QB1dkD3onQ + rm /tmp/tmp.aEr1N25PIJ /tmp/tmp.QB1dkD3onQ + return 0 namespace "cert-manager" deleted namespace "upgrade-proxysql-4513" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DFn2UvUGQh namespace "pxc-operator" deleted + cat /tmp/tmp.lAnIomxedt + rm /tmp/tmp.DFn2UvUGQh /tmp/tmp.lAnIomxedt + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.X0vF8wck3Z ++ mktemp + local LAST_ERR=/tmp/tmp.wNfHMhdYcd + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.X0vF8wck3Z namespace/pxc-operator created + cat /tmp/tmp.wNfHMhdYcd + rm /tmp/tmp.X0vF8wck3Z /tmp/tmp.wNfHMhdYcd + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.9qqK0MV5CD +++ mktemp ++ local LAST_ERR=/tmp/tmp.zwTJjid6zt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9qqK0MV5CD ++ cat /tmp/tmp.zwTJjid6zt ++ rm /tmp/tmp.9qqK0MV5CD /tmp/tmp.zwTJjid6zt ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.TO4DzR2CBD ++ mktemp + local LAST_ERR=/tmp/tmp.ia2EEjwRc2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.TO4DzR2CBD Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6" modified. + cat /tmp/tmp.ia2EEjwRc2 + rm /tmp/tmp.TO4DzR2CBD /tmp/tmp.ia2EEjwRc2 + return 0 + deploy_operator_gh v1.18.0 + local git_tag=v1.18.0 + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- ++ kubectl_bin get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4hOiDxPPn2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.mBUzbJpNEx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4hOiDxPPn2 ++ cat /tmp/tmp.mBUzbJpNEx ++ rm /tmp/tmp.4hOiDxPPn2 /tmp/tmp.mBUzbJpNEx ++ return 0 + [[ -n perconaxtradbclusters.pxc.percona.com ]] ++ kubectl_bin get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-18-0")].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZmFt09JKiI +++ mktemp ++ local LAST_ERR=/tmp/tmp.5IsragYLiw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-18-0")].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZmFt09JKiI ++ cat /tmp/tmp.5IsragYLiw ++ rm /tmp/tmp.ZmFt09JKiI /tmp/tmp.5IsragYLiw ++ return 0 + [[ -n '' ]] + kubectl_bin apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.up0cvWW5HP ++ mktemp + local LAST_ERR=/tmp/tmp.ejucqkDWg3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.up0cvWW5HP + cat /tmp/tmp.ejucqkDWg3 + rm /tmp/tmp.up0cvWW5HP /tmp/tmp.ejucqkDWg3 + return 0 + local rbac_yaml=rbac + local operator_yaml=operator.yaml + '[' -n pxc-operator ']' + rbac_yaml=cw-rbac + operator_yaml=cw-operator.yaml + apply_rbac_gh cw-rbac v1.18.0 + local operator_namespace=pxc-operator + local rbac=cw-rbac + local git_tag=v1.18.0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cw-rbac.yaml + /usr/bin/sed -i -e 's^namespace: .*^namespace: pxc-operator^' /tmp/tmp.w6DN2DTbg5/rbac_v1.18.0.yaml + kubectl_bin apply -f /tmp/tmp.w6DN2DTbg5/rbac_v1.18.0.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.L6p8KpbDdf ++ mktemp + local LAST_ERR=/tmp/tmp.y5MBoeDuBu + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /tmp/tmp.w6DN2DTbg5/rbac_v1.18.0.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L6p8KpbDdf clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.y5MBoeDuBu + rm /tmp/tmp.L6p8KpbDdf /tmp/tmp.y5MBoeDuBu + return 0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cw-operator.yaml + cat /tmp/tmp.w6DN2DTbg5/cw-operator.yaml_v1.18.0.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:1.18.0^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' + kubectl_bin apply -n pxc-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.Ct4wpwp1eL ++ mktemp + local LAST_ERR=/tmp/tmp.8zXQYMY2tL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n pxc-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ct4wpwp1eL deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.8zXQYMY2tL + rm /tmp/tmp.Ct4wpwp1eL /tmp/tmp.8zXQYMY2tL + return 0 + sleep 2 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.NBlGrqcomn +++ mktemp ++ local LAST_ERR=/tmp/tmp.gfhqBJlewm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NBlGrqcomn ++ cat /tmp/tmp.gfhqBJlewm ++ rm /tmp/tmp.NBlGrqcomn /tmp/tmp.gfhqBJlewm ++ return 0 + wait_pod percona-xtradb-cluster-operator-85f65db574-gnvcm + local pod=percona-xtradb-cluster-operator-85f65db574-gnvcm + local max_retry=480 + local ns= ++ echo percona-xtradb-cluster-operator-85f65db574-gnvcm ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-85f65db574-gnvcm condition met waiting for pod/percona-xtradb-cluster-operator-85f65db574-gnvcm to become Ready.Ok + create_namespace upgrade-proxysql-31261 + local namespace=upgrade-proxysql-31261 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces upgrade-proxysql-31261' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces upgrade-proxysql-31261 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace upgrade-proxysql-31261 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.8n6g7QQdHr + local LAST_OUT=/tmp/tmp.m696JnMQYK ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.SZ3O1GWVc4 + local exit_status=0 + local LAST_ERR=/tmp/tmp.hoIcgAkcrv + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace upgrade-proxysql-31261 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8n6g7QQdHr + cat /tmp/tmp.SZ3O1GWVc4 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + rm /tmp/tmp.8n6g7QQdHr /tmp/tmp.SZ3O1GWVc4 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace upgrade-proxysql-31261 + return 0 error: resource(s) were provided, but no name was specified + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace upgrade-proxysql-31261 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.m696JnMQYK + cat /tmp/tmp.hoIcgAkcrv Error from server (NotFound): namespaces "upgrade-proxysql-31261" not found + rm /tmp/tmp.m696JnMQYK /tmp/tmp.hoIcgAkcrv + return 1 + : + wait_for_delete namespace/upgrade-proxysql-31261 + local res=namespace/upgrade-proxysql-31261 + echo -n 'waiting for namespace/upgrade-proxysql-31261 to be deleted' waiting for namespace/upgrade-proxysql-31261 to be deleted+ set +o xtrace Error from server (NotFound): namespaces "upgrade-proxysql-31261" not found + desc 'create namespace upgrade-proxysql-31261' + set +o xtrace ----------------------------------------------------------------------------------- create namespace upgrade-proxysql-31261 ----------------------------------------------------------------------------------- + kubectl_bin create namespace upgrade-proxysql-31261 ++ mktemp + local LAST_OUT=/tmp/tmp.KPMfr667f5 ++ mktemp + local LAST_ERR=/tmp/tmp.NKrIBji8BI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace upgrade-proxysql-31261 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KPMfr667f5 namespace/upgrade-proxysql-31261 created + cat /tmp/tmp.NKrIBji8BI + rm /tmp/tmp.KPMfr667f5 /tmp/tmp.NKrIBji8BI + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.UmYPZThfrq +++ mktemp ++ local LAST_ERR=/tmp/tmp.xKnU8j063u ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UmYPZThfrq ++ cat /tmp/tmp.xKnU8j063u ++ rm /tmp/tmp.UmYPZThfrq /tmp/tmp.xKnU8j063u ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=upgrade-proxysql-31261 ++ mktemp + local LAST_OUT=/tmp/tmp.656iOyZUz9 ++ mktemp + local LAST_ERR=/tmp/tmp.lVgfwEuZA3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=upgrade-proxysql-31261 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.656iOyZUz9 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6" modified. + cat /tmp/tmp.lVgfwEuZA3 + rm /tmp/tmp.656iOyZUz9 /tmp/tmp.lVgfwEuZA3 + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.QodVKi8RXW ++ mktemp + local LAST_ERR=/tmp/tmp.R1xXNjfw2q + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.QodVKi8RXW secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.R1xXNjfw2q + rm /tmp/tmp.QodVKi8RXW /tmp/tmp.R1xXNjfw2q + return 0 + local proxy=proxysql + local cr_yaml=/tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + prepare_cr_yaml /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml proxysql upgrade-proxysql 3 v1.18.0 + local cr_yaml=/tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + local proxy=proxysql + local cluster=upgrade-proxysql + local cluster_size=3 + local git_tag=v1.18.0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cr.yaml + yq eval ' .metadata.name = "upgrade-proxysql" | .spec.secretsName = "my-cluster-secrets" | .spec.vaultSecretName = "some-name-vault" | .spec.sslSecretName = "some-name-ssl" | .spec.sslInternalSecretName = "some-name-ssl-internal" | .spec.upgradeOptions.apply = "disabled" | .spec.pxc.size = 3 | .spec.proxysql.size = 3 | .spec.haproxy.size = 3 | .spec.pxc.image = "-pxc" | .spec.proxysql.image = "-proxysql" | .spec.haproxy.image = "-haproxy" | .spec.backup.image = "-backup" | .spec.backup.storages.minio.s3.credentialsSecret = "minio-secret" | .spec.backup.storages.minio.s3.region = "us-east-1" | .spec.backup.storages.minio.s3.bucket = "operator-testing" | .spec.backup.storages.minio.s3.endpointUrl = "http://minio-service.#namespace:9000/" | .spec.backup.storages.minio.type = "s3" | .spec.pmm.image = "-pmm" ' - + [[ proxysql == \h\a\p\r\o\x\y ]] + yq -i eval ' .spec.haproxy.enabled = false | .spec.proxysql.enabled = true ' /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + [[ -n '' ]] + spinup_pxc upgrade-proxysql /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml 3 30 /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/secrets_without_tls.yml + local cluster=upgrade-proxysql + local config=/tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + local size=3 + local sleep=30 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.mtodIKpiO6 ++ mktemp + local LAST_ERR=/tmp/tmp.ZVIquu3YMg + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mtodIKpiO6 secret/my-cluster-secrets created + cat /tmp/tmp.ZVIquu3YMg + rm /tmp/tmp.mtodIKpiO6 /tmp/tmp.ZVIquu3YMg + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: percona/percona-xtradb-cluster:5.7.44-31.65#' ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + local LAST_OUT=/tmp/tmp.po7XjH1Nn7 + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: percona/percona-xtradb-cluster:5.7.44-31.65#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:1.18.0#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: percona/haproxy:2.8.15#' + /usr/bin/sed -e 's#image:.*-pmm$#image: percona/pmm-client:3.3.1#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: percona/fluentbit:4.0.1#' + /usr/bin/sed -e 's#image:.*-backup$#image: percona/percona-xtrabackup:2.4.29#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: percona/proxysql2:2.7.3#' ++ mktemp + local LAST_ERR=/tmp/tmp.xivkk7Pcjn + local exit_status=0 ++ seq 0 2 + /usr/bin/sed -e s~minio-service.#namespace~minio-service.upgrade-proxysql-31261~ + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.po7XjH1Nn7 deployment.apps/pxc-client created + cat /tmp/tmp.xivkk7Pcjn + rm /tmp/tmp.po7XjH1Nn7 /tmp/tmp.xivkk7Pcjn + return 0 + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ upgrade-proxysql == \d\e\m\a\n\d\-\b\a\c\k\u\p ]] + [[ upgrade-proxysql == \d\e\m\a\n\d\-\b\a\c\k\u\p\-\c\l\o\u\d ]] + apply_config /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + '[' -z '' ']' + cat_config /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + kubectl_bin apply -f - + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: percona/percona-xtradb-cluster:5.7.44-31.65#' + /usr/bin/sed -e 's#image:.*-pmm$#image: percona/pmm-client:3.3.1#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: percona/haproxy:2.8.15#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-backup$#image: percona/percona-xtrabackup:2.4.29#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:1.18.0#' + cat /tmp/tmp.w6DN2DTbg5/cr_1.18.0_proxysql.yaml + /usr/bin/sed -e 's#image:.*-proxysql$#image: percona/proxysql2:2.7.3#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: percona/percona-xtradb-cluster:5.7.44-31.65#' ++ mktemp + local LAST_OUT=/tmp/tmp.ybBsUD5nNC ++ mktemp + /usr/bin/sed -e 's#image:.*-logcollector$#image: percona/fluentbit:4.0.1#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.upgrade-proxysql-31261~ + local LAST_ERR=/tmp/tmp.MoAPGlaL1T + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ybBsUD5nNC perconaxtradbcluster.pxc.percona.com/upgrade-proxysql created + cat /tmp/tmp.MoAPGlaL1T + rm /tmp/tmp.ybBsUD5nNC /tmp/tmp.MoAPGlaL1T + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy upgrade-proxysql ++ local target_cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.CKBolQpZbP ++++ mktemp +++ local LAST_ERR=/tmp/tmp.aBmenDwXMU +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.CKBolQpZbP +++ cat /tmp/tmp.aBmenDwXMU +++ rm /tmp/tmp.CKBolQpZbP /tmp/tmp.aBmenDwXMU +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.b1OtM1dxON ++++ mktemp +++ local LAST_ERR=/tmp/tmp.wNhtU8AGeW +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.b1OtM1dxON +++ cat /tmp/tmp.wNhtU8AGeW +++ rm /tmp/tmp.b1OtM1dxON /tmp/tmp.wNhtU8AGeW +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo upgrade-proxysql-proxysql ++ return + local proxy=upgrade-proxysql-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-31261 ++ mktemp + local LAST_OUT=/tmp/tmp.4fdx26r4CF ++ mktemp + local LAST_ERR=/tmp/tmp.BUBcY7DQRp + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-31261 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-31261 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-31261 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.4fdx26r4CF + cat /tmp/tmp.BUBcY7DQRp error: no matching resources found + rm /tmp/tmp.4fdx26r4CF /tmp/tmp.BUBcY7DQRp + return 1 + true + wait_for_running upgrade-proxysql-proxysql 1 + local name=upgrade-proxysql-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-proxysql-0 480 + local pod=upgrade-proxysql-proxysql-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/upgrade-proxysql-proxysql-0 condition met waiting for pod/upgrade-proxysql-proxysql-0 to become Ready.Ok + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok + sleep 30 ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.secretsName}' + local secret_name=my-cluster-secrets ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.ww37UZjsvi +++ mktemp ++ local LAST_ERR=/tmp/tmp.NPTTPwpTXq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ww37UZjsvi ++ cat /tmp/tmp.NPTTPwpTXq ++ rm /tmp/tmp.ww37UZjsvi /tmp/tmp.NPTTPwpTXq ++ return 0 + local root_pass=root_password + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] ++ is_keyring_plugin_in_use upgrade-proxysql ++ local cluster=upgrade-proxysql ++ kubectl_bin exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CpRxJFzKAU +++ mktemp ++ local LAST_ERR=/tmp/tmp.IcQJ4qM6fT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CpRxJFzKAU ++ cat /tmp/tmp.IcQJ4qM6fT Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.CpRxJFzKAU /tmp/tmp.IcQJ4qM6fT ++ return 0 + [[ -n '' ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7GApYfAMaZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.MAnIKL53ux ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7GApYfAMaZ ++ cat /tmp/tmp.MAnIKL53ux ++ rm /tmp/tmp.7GApYfAMaZ /tmp/tmp.MAnIKL53ux ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lwzMN8dxRb +++ mktemp ++ local LAST_ERR=/tmp/tmp.Z7LB5Q9188 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.lwzMN8dxRb ++ cat /tmp/tmp.Z7LB5Q9188 ++ rm /tmp/tmp.lwzMN8dxRb /tmp/tmp.Z7LB5Q9188 ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fMaphvRIAM +++ mktemp ++ local LAST_ERR=/tmp/tmp.pxwEYfalZW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fMaphvRIAM ++ cat /tmp/tmp.pxwEYfalZW ++ rm /tmp/tmp.fMaphvRIAM /tmp/tmp.pxwEYfalZW ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tsbs6aKyWU +++ mktemp ++ local LAST_ERR=/tmp/tmp.OpdjITMwzH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tsbs6aKyWU ++ cat /tmp/tmp.OpdjITMwzH ++ rm /tmp/tmp.tsbs6aKyWU /tmp/tmp.OpdjITMwzH ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IqiaM6ChPM +++ mktemp ++ local LAST_ERR=/tmp/tmp.HfO1OPvCiI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.IqiaM6ChPM ++ cat /tmp/tmp.HfO1OPvCiI ++ rm /tmp/tmp.IqiaM6ChPM /tmp/tmp.HfO1OPvCiI ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql ++ is_keyring_plugin_in_use upgrade-proxysql ++ local cluster=upgrade-proxysql ++ kubectl_bin exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NRRkyDYMrC +++ mktemp ++ local LAST_ERR=/tmp/tmp.ijzFFGm59a ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NRRkyDYMrC ++ cat /tmp/tmp.ijzFFGm59a Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.NRRkyDYMrC /tmp/tmp.ijzFFGm59a ++ return 0 + '[' '' ']' + compare_generation 1 proxysql upgrade-proxysql + local generation=1 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 1 pxc upgrade-proxysql + local generation=1 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qJQ6tLKLqT +++ mktemp ++ local LAST_ERR=/tmp/tmp.OxAoRLIPN0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qJQ6tLKLqT ++ cat /tmp/tmp.OxAoRLIPN0 ++ rm /tmp/tmp.qJQ6tLKLqT /tmp/tmp.OxAoRLIPN0 ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + for container in '"${containers[@]}"' + check_generation 1 proxysql upgrade-proxysql + local generation=1 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cvHHc77bGF +++ mktemp ++ local LAST_ERR=/tmp/tmp.hGx6Ea4l9t ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cvHHc77bGF ++ cat /tmp/tmp.hGx6Ea4l9t ++ rm /tmp/tmp.cvHHc77bGF /tmp/tmp.hGx6Ea4l9t ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + desc 'upgrade operator' + set +o xtrace ----------------------------------------------------------------------------------- upgrade operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.g57lZ19z6I ++ mktemp + local LAST_ERR=/tmp/tmp.FwJzLSBdyX + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.g57lZ19z6I customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.FwJzLSBdyX + rm /tmp/tmp.g57lZ19z6I /tmp/tmp.FwJzLSBdyX + return 0 + [[ -n pxc-operator ]] + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: pxc-operator^' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.K0kInwXEi2 ++ mktemp + local LAST_ERR=/tmp/tmp.WmDzNC9VB2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.K0kInwXEi2 clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.WmDzNC9VB2 + rm /tmp/tmp.K0kInwXEi2 /tmp/tmp.WmDzNC9VB2 + return 0 + kubectl_bin patch deployment percona-xtradb-cluster-operator '-p{"spec":{"template":{"spec":{"containers":[{"name":"percona-xtradb-cluster-operator","image":"perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7"}]}}}}' -n pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.XRu9iywQwq ++ mktemp + local LAST_ERR=/tmp/tmp.pkSZptDYqL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch deployment percona-xtradb-cluster-operator '-p{"spec":{"template":{"spec":{"containers":[{"name":"percona-xtradb-cluster-operator","image":"perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7"}]}}}}' -n pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.XRu9iywQwq deployment.apps/percona-xtradb-cluster-operator patched + cat /tmp/tmp.pkSZptDYqL + rm /tmp/tmp.XRu9iywQwq /tmp/tmp.pkSZptDYqL + return 0 + kubectl_bin rollout status deployment/percona-xtradb-cluster-operator -n pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.PoDI6ZPMyn ++ mktemp + local LAST_ERR=/tmp/tmp.g0lu9SchIV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl rollout status deployment/percona-xtradb-cluster-operator -n pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PoDI6ZPMyn Waiting for deployment "percona-xtradb-cluster-operator" rollout to finish: 0 out of 1 new replicas have been updated... Waiting for deployment "percona-xtradb-cluster-operator" rollout to finish: 0 of 1 updated replicas are available... deployment "percona-xtradb-cluster-operator" successfully rolled out + cat /tmp/tmp.g0lu9SchIV + rm /tmp/tmp.PoDI6ZPMyn /tmp/tmp.g0lu9SchIV + return 0 + sleep 10 + desc 'wait for operator upgrade' + set +o xtrace ----------------------------------------------------------------------------------- wait for operator upgrade ----------------------------------------------------------------------------------- + local i=0 + local max=60 ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' -n pxc-operator ++ grep -vc NAME ++ awk '{print $1}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gi521N1tCM +++ mktemp ++ local LAST_ERR=/tmp/tmp.IOWCYmwT9E ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gi521N1tCM ++ cat /tmp/tmp.IOWCYmwT9E ++ rm /tmp/tmp.gi521N1tCM /tmp/tmp.IOWCYmwT9E ++ return 0 + [[ 1 -eq 1 ]] + '[' -n pxc-operator ']' ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.Fk2CFL3Q8U +++ mktemp ++ local LAST_ERR=/tmp/tmp.4a85JUqSpP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Fk2CFL3Q8U ++ cat /tmp/tmp.4a85JUqSpP ++ rm /tmp/tmp.Fk2CFL3Q8U /tmp/tmp.4a85JUqSpP ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.7QchszDw65 ++ mktemp + local LAST_ERR=/tmp/tmp.8EH6A70lFL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7QchszDw65 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6" modified. + cat /tmp/tmp.8EH6A70lFL + rm /tmp/tmp.7QchszDw65 /tmp/tmp.8EH6A70lFL + return 0 ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' ++ grep perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 ++ awk '{print $1}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8k0YF2lD4L +++ mktemp ++ local LAST_ERR=/tmp/tmp.sS0vcO9I7V ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8k0YF2lD4L ++ cat /tmp/tmp.sS0vcO9I7V ++ rm /tmp/tmp.8k0YF2lD4L /tmp/tmp.sS0vcO9I7V ++ return 0 + wait_pod percona-xtradb-cluster-operator-5b676b9b4d-hr9qw + local pod=percona-xtradb-cluster-operator-5b676b9b4d-hr9qw + local max_retry=480 + local ns= ++ echo percona-xtradb-cluster-operator-5b676b9b4d-hr9qw ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-5b676b9b4d-hr9qw condition met waiting for pod/percona-xtradb-cluster-operator-5b676b9b4d-hr9qw to become Ready.Ok ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vserxp0gvC +++ mktemp ++ local LAST_ERR=/tmp/tmp.zO16rof4FI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Vserxp0gvC ++ cat /tmp/tmp.zO16rof4FI ++ rm /tmp/tmp.Vserxp0gvC /tmp/tmp.zO16rof4FI ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=upgrade-proxysql-31261 ++ mktemp + local LAST_OUT=/tmp/tmp.KAAbPbde5j ++ mktemp + local LAST_ERR=/tmp/tmp.2NaKukVAg9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6 --namespace=upgrade-proxysql-31261 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KAAbPbde5j Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2207-f8e092d7-9-cluster6" modified. + cat /tmp/tmp.2NaKukVAg9 + rm /tmp/tmp.KAAbPbde5j /tmp/tmp.2NaKukVAg9 + return 0 + desc 'check images and generation after operator upgrade' + set +o xtrace ----------------------------------------------------------------------------------- check images and generation after operator upgrade ----------------------------------------------------------------------------------- + check_pxc_liveness upgrade-proxysql 3 + local cluster=upgrade-proxysql + local cluster_size=3 + wait_cluster_consistency upgrade-proxysql 3 + local cluster_name=upgrade-proxysql + local cluster_size=3 + local proxy_size= + '[' -z '' ']' ++ get_proxy_size upgrade-proxysql ++ local cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.ccpOwcn2q6 ++++ mktemp +++ local LAST_ERR=/tmp/tmp.m6eTaCq01H +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.ccpOwcn2q6 +++ cat /tmp/tmp.m6eTaCq01H +++ rm /tmp/tmp.ccpOwcn2q6 /tmp/tmp.m6eTaCq01H +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.gA7sjxISJz ++++ mktemp +++ local LAST_ERR=/tmp/tmp.5wmYiY0v7K +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.gA7sjxISJz +++ cat /tmp/tmp.5wmYiY0v7K +++ rm /tmp/tmp.gA7sjxISJz /tmp/tmp.5wmYiY0v7K +++ return 0 ++ [[ true == \t\r\u\e ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EMBH8TOZWE +++ mktemp ++ local LAST_ERR=/tmp/tmp.YphKOqHaNo ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EMBH8TOZWE ++ cat /tmp/tmp.YphKOqHaNo ++ rm /tmp/tmp.EMBH8TOZWE /tmp/tmp.YphKOqHaNo ++ return 0 ++ return + proxy_size=3 + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/upgrade-proxysql to be ready' waiting for pxc/upgrade-proxysql to be ready++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.btvtDOMv1U +++ mktemp ++ local LAST_ERR=/tmp/tmp.CMwISjbjdb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.btvtDOMv1U ++ cat /tmp/tmp.CMwISjbjdb ++ rm /tmp/tmp.btvtDOMv1U /tmp/tmp.CMwISjbjdb ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.O5OPUjaqLy +++ mktemp ++ local LAST_ERR=/tmp/tmp.5XKdDwya1Q ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.O5OPUjaqLy ++ cat /tmp/tmp.5XKdDwya1Q ++ rm /tmp/tmp.O5OPUjaqLy /tmp/tmp.5XKdDwya1Q ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine upgrade-proxysql +++ local cluster_name=upgrade-proxysql ++++ get_proxy upgrade-proxysql ++++ local target_cluster=upgrade-proxysql +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.HIAblgP5Zn ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Apl12MRwTN +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.HIAblgP5Zn +++++ cat /tmp/tmp.Apl12MRwTN +++++ rm /tmp/tmp.HIAblgP5Zn /tmp/tmp.Apl12MRwTN +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.00gmC20Zmb ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.hZGf9yBEkQ +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.00gmC20Zmb +++++ cat /tmp/tmp.hZGf9yBEkQ +++++ rm /tmp/tmp.00gmC20Zmb /tmp/tmp.hZGf9yBEkQ +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo upgrade-proxysql-proxysql ++++ return +++ local cluster_proxy=upgrade-proxysql-proxysql +++ echo proxysql ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kr1BAluKgP +++ mktemp ++ local LAST_ERR=/tmp/tmp.HtBKUAzELQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kr1BAluKgP ++ cat /tmp/tmp.HtBKUAzELQ ++ rm /tmp/tmp.kr1BAluKgP /tmp/tmp.HtBKUAzELQ ++ return 0 + [[ 3 == \3 ]] + echo + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok ++ seq 0 2 + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KW3DLORRkl +++ mktemp ++ local LAST_ERR=/tmp/tmp.wwfRn0gjiw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KW3DLORRkl ++ cat /tmp/tmp.wwfRn0gjiw ++ rm /tmp/tmp.KW3DLORRkl /tmp/tmp.wwfRn0gjiw ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d7N5qRmkg5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.RNm6Gi09jl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.d7N5qRmkg5 ++ cat /tmp/tmp.RNm6Gi09jl ++ rm /tmp/tmp.d7N5qRmkg5 /tmp/tmp.RNm6Gi09jl ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Q7tkf0aSCh +++ mktemp ++ local LAST_ERR=/tmp/tmp.3i7e2aV7L8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Q7tkf0aSCh ++ cat /tmp/tmp.3i7e2aV7L8 ++ rm /tmp/tmp.Q7tkf0aSCh /tmp/tmp.3i7e2aV7L8 ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql ++ kubectl_bin get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3pdlXBI6MY +++ mktemp ++ local LAST_ERR=/tmp/tmp.oyPoyflb25 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3pdlXBI6MY ++ cat /tmp/tmp.oyPoyflb25 ++ rm /tmp/tmp.3pdlXBI6MY /tmp/tmp.oyPoyflb25 ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 == perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xcgWOwIpsz +++ mktemp ++ local LAST_ERR=/tmp/tmp.MaCWz1kucR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xcgWOwIpsz ++ cat /tmp/tmp.MaCWz1kucR ++ rm /tmp/tmp.xcgWOwIpsz /tmp/tmp.MaCWz1kucR ++ return 0 + [[ percona/proxysql2:2.7.3 == percona/proxysql2:2.7.3 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BhMIGL1k9R +++ mktemp ++ local LAST_ERR=/tmp/tmp.648dPlq7Ce ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BhMIGL1k9R ++ cat /tmp/tmp.648dPlq7Ce ++ rm /tmp/tmp.BhMIGL1k9R /tmp/tmp.648dPlq7Ce ++ return 0 + [[ percona/haproxy:2.8.15 == percona/haproxy:2.8.15 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0GqT69BJJe +++ mktemp ++ local LAST_ERR=/tmp/tmp.Tvwct69CDO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0GqT69BJJe ++ cat /tmp/tmp.Tvwct69CDO ++ rm /tmp/tmp.0GqT69BJJe /tmp/tmp.Tvwct69CDO ++ return 0 + [[ percona/percona-xtrabackup:2.4.29 == percona/percona-xtrabackup:2.4.29 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rqywUq3uX7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3pz9s5o8Gx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rqywUq3uX7 ++ cat /tmp/tmp.3pz9s5o8Gx ++ rm /tmp/tmp.rqywUq3uX7 /tmp/tmp.3pz9s5o8Gx ++ return 0 + [[ percona/pmm-client:3.3.1 == percona/pmm-client:3.3.1 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NyoyXaxhGf +++ mktemp ++ local LAST_ERR=/tmp/tmp.xGVEfnhQ75 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NyoyXaxhGf ++ cat /tmp/tmp.xGVEfnhQ75 ++ rm /tmp/tmp.NyoyXaxhGf /tmp/tmp.xGVEfnhQ75 ++ return 0 + [[ percona/fluentbit:4.0.1 == percona/fluentbit:4.0.1 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2dKlbxkEM6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Fc5TPdF0kz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2dKlbxkEM6 ++ cat /tmp/tmp.Fc5TPdF0kz ++ rm /tmp/tmp.2dKlbxkEM6 /tmp/tmp.Fc5TPdF0kz ++ return 0 + [[ percona/percona-xtradb-cluster:5.7.44-31.65 == percona/percona-xtradb-cluster:5.7.44-31.65 ]] + : Operator image has been updated correctly + compare_generation 1 proxysql upgrade-proxysql + local generation=1 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 1 pxc upgrade-proxysql + local generation=1 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tBW7W87YTk +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZzVf5WiOG9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tBW7W87YTk ++ cat /tmp/tmp.ZzVf5WiOG9 ++ rm /tmp/tmp.tBW7W87YTk /tmp/tmp.ZzVf5WiOG9 ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + for container in '"${containers[@]}"' + check_generation 1 proxysql upgrade-proxysql + local generation=1 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RsYqtnE1Xt +++ mktemp ++ local LAST_ERR=/tmp/tmp.8fiWgG3eet ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RsYqtnE1Xt ++ cat /tmp/tmp.8fiWgG3eet ++ rm /tmp/tmp.RsYqtnE1Xt /tmp/tmp.8fiWgG3eet ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + desc 'patch pxc images and upgrade' + set +o xtrace ----------------------------------------------------------------------------------- patch pxc images and upgrade ----------------------------------------------------------------------------------- + kubectl_bin patch pxc upgrade-proxysql --type=merge --patch '{ "spec": { "crVersion": "1.19.0", "pxc": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc5.7" }, "pmm": { "image": "perconalab/pmm-client:dev-latest" }, "haproxy": { "image": "perconalab/percona-xtradb-cluster-operator:main-haproxy" }, "proxysql": { "image": "perconalab/percona-xtradb-cluster-operator:main-proxysql" }, "logcollector": { "image": "perconalab/percona-xtradb-cluster-operator:main-logcollector" }, "backup": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup" } }}' ++ mktemp + local LAST_OUT=/tmp/tmp.OKDxFHWzEk ++ mktemp + local LAST_ERR=/tmp/tmp.1aS1JQqRqm + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc upgrade-proxysql --type=merge --patch '{ "spec": { "crVersion": "1.19.0", "pxc": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc5.7" }, "pmm": { "image": "perconalab/pmm-client:dev-latest" }, "haproxy": { "image": "perconalab/percona-xtradb-cluster-operator:main-haproxy" }, "proxysql": { "image": "perconalab/percona-xtradb-cluster-operator:main-proxysql" }, "logcollector": { "image": "perconalab/percona-xtradb-cluster-operator:main-logcollector" }, "backup": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup" } }}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OKDxFHWzEk perconaxtradbcluster.pxc.percona.com/upgrade-proxysql patched + cat /tmp/tmp.1aS1JQqRqm + rm /tmp/tmp.OKDxFHWzEk /tmp/tmp.1aS1JQqRqm + return 0 + sleep 10 + desc 'check images and generation after full upgrade' + set +o xtrace ----------------------------------------------------------------------------------- check images and generation after full upgrade ----------------------------------------------------------------------------------- + check_pxc_liveness upgrade-proxysql 3 + local cluster=upgrade-proxysql + local cluster_size=3 + wait_cluster_consistency upgrade-proxysql 3 + local cluster_name=upgrade-proxysql + local cluster_size=3 + local proxy_size= + '[' -z '' ']' ++ get_proxy_size upgrade-proxysql ++ local cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.yg6WQcs3nd ++++ mktemp +++ local LAST_ERR=/tmp/tmp.XzNGegARVB +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.yg6WQcs3nd +++ cat /tmp/tmp.XzNGegARVB +++ rm /tmp/tmp.yg6WQcs3nd /tmp/tmp.XzNGegARVB +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.Le05fE9qfF ++++ mktemp +++ local LAST_ERR=/tmp/tmp.OL5S5LrKlF +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.Le05fE9qfF +++ cat /tmp/tmp.OL5S5LrKlF +++ rm /tmp/tmp.Le05fE9qfF /tmp/tmp.OL5S5LrKlF +++ return 0 ++ [[ true == \t\r\u\e ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w39dbtnegw +++ mktemp ++ local LAST_ERR=/tmp/tmp.wrzp5vE0VB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.w39dbtnegw ++ cat /tmp/tmp.wrzp5vE0VB ++ rm /tmp/tmp.w39dbtnegw /tmp/tmp.wrzp5vE0VB ++ return 0 ++ return + proxy_size=3 + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/upgrade-proxysql to be ready' waiting for pxc/upgrade-proxysql to be ready++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ESu6KtlGmb +++ mktemp ++ local LAST_ERR=/tmp/tmp.NO8aihiwPg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ESu6KtlGmb ++ cat /tmp/tmp.NO8aihiwPg ++ rm /tmp/tmp.ESu6KtlGmb /tmp/tmp.NO8aihiwPg ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 0 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b7AOTxFr87 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Vf5xccJ7hj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.b7AOTxFr87 ++ cat /tmp/tmp.Vf5xccJ7hj ++ rm /tmp/tmp.b7AOTxFr87 /tmp/tmp.Vf5xccJ7hj ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 1 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LFpQLj1hk8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Oxrx6d98Wl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LFpQLj1hk8 ++ cat /tmp/tmp.Oxrx6d98Wl ++ rm /tmp/tmp.LFpQLj1hk8 /tmp/tmp.Oxrx6d98Wl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 2 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hYtSxIoMvZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.jhHxbsLEZH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hYtSxIoMvZ ++ cat /tmp/tmp.jhHxbsLEZH ++ rm /tmp/tmp.hYtSxIoMvZ /tmp/tmp.jhHxbsLEZH ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 3 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qjsjR7ioOW +++ mktemp ++ local LAST_ERR=/tmp/tmp.bhMEWueSle ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qjsjR7ioOW ++ cat /tmp/tmp.bhMEWueSle ++ rm /tmp/tmp.qjsjR7ioOW /tmp/tmp.bhMEWueSle ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 4 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RO1YLzLWBj +++ mktemp ++ local LAST_ERR=/tmp/tmp.CXIl4AYZU1 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RO1YLzLWBj ++ cat /tmp/tmp.CXIl4AYZU1 ++ rm /tmp/tmp.RO1YLzLWBj /tmp/tmp.CXIl4AYZU1 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 5 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PD1dWJjGMf +++ mktemp ++ local LAST_ERR=/tmp/tmp.86zmkxmNr2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PD1dWJjGMf ++ cat /tmp/tmp.86zmkxmNr2 ++ rm /tmp/tmp.PD1dWJjGMf /tmp/tmp.86zmkxmNr2 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 6 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CU537FyAY5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.JXMLB08mZT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CU537FyAY5 ++ cat /tmp/tmp.JXMLB08mZT ++ rm /tmp/tmp.CU537FyAY5 /tmp/tmp.JXMLB08mZT ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 7 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GCJCrRnQyp +++ mktemp ++ local LAST_ERR=/tmp/tmp.0jp7j9DJ7c ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GCJCrRnQyp ++ cat /tmp/tmp.0jp7j9DJ7c ++ rm /tmp/tmp.GCJCrRnQyp /tmp/tmp.0jp7j9DJ7c ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 8 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DZ4w4KdrGx +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZpOo4xoiIC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DZ4w4KdrGx ++ cat /tmp/tmp.ZpOo4xoiIC ++ rm /tmp/tmp.DZ4w4KdrGx /tmp/tmp.ZpOo4xoiIC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 9 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TF6akChOM1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.bNhOVv4a1U ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TF6akChOM1 ++ cat /tmp/tmp.bNhOVv4a1U ++ rm /tmp/tmp.TF6akChOM1 /tmp/tmp.bNhOVv4a1U ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 10 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CQWUrNNbV2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.X01xr9z2WX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CQWUrNNbV2 ++ cat /tmp/tmp.X01xr9z2WX ++ rm /tmp/tmp.CQWUrNNbV2 /tmp/tmp.X01xr9z2WX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 11 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yYqC4ghE9e +++ mktemp ++ local LAST_ERR=/tmp/tmp.AZLLccOab3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yYqC4ghE9e ++ cat /tmp/tmp.AZLLccOab3 ++ rm /tmp/tmp.yYqC4ghE9e /tmp/tmp.AZLLccOab3 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 12 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JSqzQbWCBP +++ mktemp ++ local LAST_ERR=/tmp/tmp.AinU93DJau ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JSqzQbWCBP ++ cat /tmp/tmp.AinU93DJau ++ rm /tmp/tmp.JSqzQbWCBP /tmp/tmp.AinU93DJau ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 13 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LChmZH3zbq +++ mktemp ++ local LAST_ERR=/tmp/tmp.jWytFxQt37 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LChmZH3zbq ++ cat /tmp/tmp.jWytFxQt37 ++ rm /tmp/tmp.LChmZH3zbq /tmp/tmp.jWytFxQt37 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 14 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6HmL8Tbniq +++ mktemp ++ local LAST_ERR=/tmp/tmp.HLpCj09is4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6HmL8Tbniq ++ cat /tmp/tmp.HLpCj09is4 ++ rm /tmp/tmp.6HmL8Tbniq /tmp/tmp.HLpCj09is4 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 15 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3IFOf6Zz6Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.mQvzqkOVUs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3IFOf6Zz6Y ++ cat /tmp/tmp.mQvzqkOVUs ++ rm /tmp/tmp.3IFOf6Zz6Y /tmp/tmp.mQvzqkOVUs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 16 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.roZU2PLccD +++ mktemp ++ local LAST_ERR=/tmp/tmp.Buq6dBQ0UP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.roZU2PLccD ++ cat /tmp/tmp.Buq6dBQ0UP ++ rm /tmp/tmp.roZU2PLccD /tmp/tmp.Buq6dBQ0UP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 17 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EKeGCUJCxi +++ mktemp ++ local LAST_ERR=/tmp/tmp.oRJdix4hJi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EKeGCUJCxi ++ cat /tmp/tmp.oRJdix4hJi ++ rm /tmp/tmp.EKeGCUJCxi /tmp/tmp.oRJdix4hJi ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 18 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nF74I4auYH +++ mktemp ++ local LAST_ERR=/tmp/tmp.gl58sciOkq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nF74I4auYH ++ cat /tmp/tmp.gl58sciOkq ++ rm /tmp/tmp.nF74I4auYH /tmp/tmp.gl58sciOkq ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 19 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ypjGEM6vKm +++ mktemp ++ local LAST_ERR=/tmp/tmp.ff4sZ0VruD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ypjGEM6vKm ++ cat /tmp/tmp.ff4sZ0VruD ++ rm /tmp/tmp.ypjGEM6vKm /tmp/tmp.ff4sZ0VruD ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 20 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jYac5l5Uov +++ mktemp ++ local LAST_ERR=/tmp/tmp.LDiIi0Q6Wb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jYac5l5Uov ++ cat /tmp/tmp.LDiIi0Q6Wb ++ rm /tmp/tmp.jYac5l5Uov /tmp/tmp.LDiIi0Q6Wb ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 21 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f8nqXxFCNc +++ mktemp ++ local LAST_ERR=/tmp/tmp.aaGRL3IAfi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.f8nqXxFCNc ++ cat /tmp/tmp.aaGRL3IAfi ++ rm /tmp/tmp.f8nqXxFCNc /tmp/tmp.aaGRL3IAfi ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 22 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cvPw8JAMDW +++ mktemp ++ local LAST_ERR=/tmp/tmp.NDvJsZcptV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cvPw8JAMDW ++ cat /tmp/tmp.NDvJsZcptV ++ rm /tmp/tmp.cvPw8JAMDW /tmp/tmp.NDvJsZcptV ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 23 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.08J4tP56A8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.2Qs0SAjzdP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.08J4tP56A8 ++ cat /tmp/tmp.2Qs0SAjzdP ++ rm /tmp/tmp.08J4tP56A8 /tmp/tmp.2Qs0SAjzdP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 24 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wM244klmvE +++ mktemp ++ local LAST_ERR=/tmp/tmp.gN6sBVcsR4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wM244klmvE ++ cat /tmp/tmp.gN6sBVcsR4 ++ rm /tmp/tmp.wM244klmvE /tmp/tmp.gN6sBVcsR4 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 25 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8OGcftxHDp +++ mktemp ++ local LAST_ERR=/tmp/tmp.UmzwGvVhbV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8OGcftxHDp ++ cat /tmp/tmp.UmzwGvVhbV ++ rm /tmp/tmp.8OGcftxHDp /tmp/tmp.UmzwGvVhbV ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 26 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fGr2fmmJ26 +++ mktemp ++ local LAST_ERR=/tmp/tmp.m5WvJuZW2E ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fGr2fmmJ26 ++ cat /tmp/tmp.m5WvJuZW2E ++ rm /tmp/tmp.fGr2fmmJ26 /tmp/tmp.m5WvJuZW2E ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 27 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BMRMLsmO5S +++ mktemp ++ local LAST_ERR=/tmp/tmp.9Vxlo0MBbk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BMRMLsmO5S ++ cat /tmp/tmp.9Vxlo0MBbk ++ rm /tmp/tmp.BMRMLsmO5S /tmp/tmp.9Vxlo0MBbk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 28 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EdeCZwYTlh +++ mktemp ++ local LAST_ERR=/tmp/tmp.WE0ZS2F417 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EdeCZwYTlh ++ cat /tmp/tmp.WE0ZS2F417 ++ rm /tmp/tmp.EdeCZwYTlh /tmp/tmp.WE0ZS2F417 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 29 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bs3JAaNQnY +++ mktemp ++ local LAST_ERR=/tmp/tmp.NgsJGBVmKm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bs3JAaNQnY ++ cat /tmp/tmp.NgsJGBVmKm ++ rm /tmp/tmp.bs3JAaNQnY /tmp/tmp.NgsJGBVmKm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 30 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.27xoSuT7nq +++ mktemp ++ local LAST_ERR=/tmp/tmp.OaaVCr2i2g ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.27xoSuT7nq ++ cat /tmp/tmp.OaaVCr2i2g ++ rm /tmp/tmp.27xoSuT7nq /tmp/tmp.OaaVCr2i2g ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 31 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gJUsG0W124 +++ mktemp ++ local LAST_ERR=/tmp/tmp.uGPJqo600v ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gJUsG0W124 ++ cat /tmp/tmp.uGPJqo600v ++ rm /tmp/tmp.gJUsG0W124 /tmp/tmp.uGPJqo600v ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 32 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wrDnScaUPs +++ mktemp ++ local LAST_ERR=/tmp/tmp.s3BOGBmhva ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wrDnScaUPs ++ cat /tmp/tmp.s3BOGBmhva ++ rm /tmp/tmp.wrDnScaUPs /tmp/tmp.s3BOGBmhva ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 33 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GXCeoMk4ha +++ mktemp ++ local LAST_ERR=/tmp/tmp.mXE1NSvykg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GXCeoMk4ha ++ cat /tmp/tmp.mXE1NSvykg ++ rm /tmp/tmp.GXCeoMk4ha /tmp/tmp.mXE1NSvykg ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 34 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UXoXn8ipQ5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.KUQxQkDzsm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UXoXn8ipQ5 ++ cat /tmp/tmp.KUQxQkDzsm ++ rm /tmp/tmp.UXoXn8ipQ5 /tmp/tmp.KUQxQkDzsm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 35 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TDrgamPpeL +++ mktemp ++ local LAST_ERR=/tmp/tmp.v2nUdnI87V ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TDrgamPpeL ++ cat /tmp/tmp.v2nUdnI87V ++ rm /tmp/tmp.TDrgamPpeL /tmp/tmp.v2nUdnI87V ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 36 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8jRdFtj5yE +++ mktemp ++ local LAST_ERR=/tmp/tmp.LhPeM8eyOs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8jRdFtj5yE ++ cat /tmp/tmp.LhPeM8eyOs ++ rm /tmp/tmp.8jRdFtj5yE /tmp/tmp.LhPeM8eyOs ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 37 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eUxrSq9WYN +++ mktemp ++ local LAST_ERR=/tmp/tmp.PeOhjpFwLt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.eUxrSq9WYN ++ cat /tmp/tmp.PeOhjpFwLt ++ rm /tmp/tmp.eUxrSq9WYN /tmp/tmp.PeOhjpFwLt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 38 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h3zFcakii1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zHVOClD12P ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.h3zFcakii1 ++ cat /tmp/tmp.zHVOClD12P ++ rm /tmp/tmp.h3zFcakii1 /tmp/tmp.zHVOClD12P ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 39 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8y86GIWJLW +++ mktemp ++ local LAST_ERR=/tmp/tmp.eVZdPz5gv3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8y86GIWJLW ++ cat /tmp/tmp.eVZdPz5gv3 ++ rm /tmp/tmp.8y86GIWJLW /tmp/tmp.eVZdPz5gv3 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 40 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mcR8rEqNlp +++ mktemp ++ local LAST_ERR=/tmp/tmp.7ARGnNE23a ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mcR8rEqNlp ++ cat /tmp/tmp.7ARGnNE23a ++ rm /tmp/tmp.mcR8rEqNlp /tmp/tmp.7ARGnNE23a ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 41 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qGNVqBoMCJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.2sN8ijPr1X ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qGNVqBoMCJ ++ cat /tmp/tmp.2sN8ijPr1X ++ rm /tmp/tmp.qGNVqBoMCJ /tmp/tmp.2sN8ijPr1X ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 42 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2UyD4yfU1S +++ mktemp ++ local LAST_ERR=/tmp/tmp.AAYsXXiEi0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2UyD4yfU1S ++ cat /tmp/tmp.AAYsXXiEi0 ++ rm /tmp/tmp.2UyD4yfU1S /tmp/tmp.AAYsXXiEi0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 43 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rdwrM6pcV3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ptoA2xCyim ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rdwrM6pcV3 ++ cat /tmp/tmp.ptoA2xCyim ++ rm /tmp/tmp.rdwrM6pcV3 /tmp/tmp.ptoA2xCyim ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 44 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LecXS0lrjO +++ mktemp ++ local LAST_ERR=/tmp/tmp.spxWo0Qwdl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LecXS0lrjO ++ cat /tmp/tmp.spxWo0Qwdl ++ rm /tmp/tmp.LecXS0lrjO /tmp/tmp.spxWo0Qwdl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 45 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4ES703I97O +++ mktemp ++ local LAST_ERR=/tmp/tmp.XPOd1GUQEG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4ES703I97O ++ cat /tmp/tmp.XPOd1GUQEG ++ rm /tmp/tmp.4ES703I97O /tmp/tmp.XPOd1GUQEG ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hOxp8sFHeU +++ mktemp ++ local LAST_ERR=/tmp/tmp.plIaYRxpXY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hOxp8sFHeU ++ cat /tmp/tmp.plIaYRxpXY ++ rm /tmp/tmp.hOxp8sFHeU /tmp/tmp.plIaYRxpXY ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine upgrade-proxysql +++ local cluster_name=upgrade-proxysql ++++ get_proxy upgrade-proxysql ++++ local target_cluster=upgrade-proxysql +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.KrpddXDhOi ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.4KT7Ue80Dg +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.KrpddXDhOi +++++ cat /tmp/tmp.4KT7Ue80Dg +++++ rm /tmp/tmp.KrpddXDhOi /tmp/tmp.4KT7Ue80Dg +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.HQ0GZMqfPC ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.OKILtSnrxz +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.HQ0GZMqfPC +++++ cat /tmp/tmp.OKILtSnrxz +++++ rm /tmp/tmp.HQ0GZMqfPC /tmp/tmp.OKILtSnrxz +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo upgrade-proxysql-proxysql ++++ return +++ local cluster_proxy=upgrade-proxysql-proxysql +++ echo proxysql ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DlHpdEJ9ho +++ mktemp ++ local LAST_ERR=/tmp/tmp.hHgRpWSivL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DlHpdEJ9ho ++ cat /tmp/tmp.hHgRpWSivL ++ rm /tmp/tmp.DlHpdEJ9ho /tmp/tmp.hHgRpWSivL ++ return 0 + [[ 3 == \3 ]] + echo + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok ++ seq 0 2 + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2Th7sOJQje +++ mktemp ++ local LAST_ERR=/tmp/tmp.bovkyBa1lD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2Th7sOJQje ++ cat /tmp/tmp.bovkyBa1lD ++ rm /tmp/tmp.2Th7sOJQje /tmp/tmp.bovkyBa1lD ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MUM0uzTasW +++ mktemp ++ local LAST_ERR=/tmp/tmp.TzBSuJG1LR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MUM0uzTasW ++ cat /tmp/tmp.TzBSuJG1LR ++ rm /tmp/tmp.MUM0uzTasW /tmp/tmp.TzBSuJG1LR ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Jyn4dbGbaf +++ mktemp ++ local LAST_ERR=/tmp/tmp.MZyjXeVJ5y ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Jyn4dbGbaf ++ cat /tmp/tmp.MZyjXeVJ5y ++ rm /tmp/tmp.Jyn4dbGbaf /tmp/tmp.MZyjXeVJ5y ++ return 0 + client_pod=pxc-client-65c4d67b5b-7lfbf + wait_pod pxc-client-65c4d67b5b-7lfbf + local pod=pxc-client-65c4d67b5b-7lfbf + local max_retry=480 + local ns= ++ echo pxc-client-65c4d67b5b-7lfbf ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c4d67b5b-7lfbf condition met waiting for pod/pxc-client-65c4d67b5b-7lfbf to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.w6DN2DTbg5/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.w6DN2DTbg5/select-1.sql ++ kubectl_bin get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fSBWoz0po7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.GhymELIROi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fSBWoz0po7 ++ cat /tmp/tmp.GhymELIROi ++ rm /tmp/tmp.fSBWoz0po7 /tmp/tmp.GhymELIROi ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 == perconalab/percona-xtradb-cluster-operator:PR-2207-f8e092d7 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mYBvgwnE6P +++ mktemp ++ local LAST_ERR=/tmp/tmp.DcnG8uNeFm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mYBvgwnE6P ++ cat /tmp/tmp.DcnG8uNeFm ++ rm /tmp/tmp.mYBvgwnE6P /tmp/tmp.DcnG8uNeFm ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-proxysql == perconalab/percona-xtradb-cluster-operator:main-proxysql ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0WARU21QYC +++ mktemp ++ local LAST_ERR=/tmp/tmp.LJvo5fd9gL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0WARU21QYC ++ cat /tmp/tmp.LJvo5fd9gL ++ rm /tmp/tmp.0WARU21QYC /tmp/tmp.LJvo5fd9gL ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-haproxy == perconalab/percona-xtradb-cluster-operator:main-haproxy ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BQaDnvOCZz +++ mktemp ++ local LAST_ERR=/tmp/tmp.QKVtQK4KDA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BQaDnvOCZz ++ cat /tmp/tmp.QKVtQK4KDA ++ rm /tmp/tmp.BQaDnvOCZz /tmp/tmp.QKVtQK4KDA ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup == perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fPtQ5FUjuq +++ mktemp ++ local LAST_ERR=/tmp/tmp.eqCR6RGNgD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fPtQ5FUjuq ++ cat /tmp/tmp.eqCR6RGNgD ++ rm /tmp/tmp.fPtQ5FUjuq /tmp/tmp.eqCR6RGNgD ++ return 0 + [[ perconalab/pmm-client:dev-latest == perconalab/pmm-client:dev-latest ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.a2CTPYqjLF +++ mktemp ++ local LAST_ERR=/tmp/tmp.z7tydH5Owj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.a2CTPYqjLF ++ cat /tmp/tmp.z7tydH5Owj ++ rm /tmp/tmp.a2CTPYqjLF /tmp/tmp.z7tydH5Owj ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-logcollector == perconalab/percona-xtradb-cluster-operator:main-logcollector ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gwt4g59bNk +++ mktemp ++ local LAST_ERR=/tmp/tmp.EfCSfTrYPB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gwt4g59bNk ++ cat /tmp/tmp.EfCSfTrYPB ++ rm /tmp/tmp.gwt4g59bNk /tmp/tmp.EfCSfTrYPB ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 == perconalab/percona-xtradb-cluster-operator:main-pxc5.7 ]] + : Cluster images have been updated correctly + compare_generation 2 proxysql upgrade-proxysql + local generation=2 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 2 pxc upgrade-proxysql + local generation=2 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tV3CyDJIkg +++ mktemp ++ local LAST_ERR=/tmp/tmp.ecYfrRds29 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tV3CyDJIkg ++ cat /tmp/tmp.ecYfrRds29 ++ rm /tmp/tmp.tV3CyDJIkg /tmp/tmp.ecYfrRds29 ++ return 0 + current_generation=2 + [[ 2 != \2 ]] + for container in '"${containers[@]}"' + check_generation 2 proxysql upgrade-proxysql + local generation=2 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mpxZp2tOwQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.tbMRS05hA6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mpxZp2tOwQ ++ cat /tmp/tmp.tbMRS05hA6 ++ rm /tmp/tmp.mpxZp2tOwQ /tmp/tmp.tbMRS05hA6 ++ return 0 + current_generation=2 + [[ 2 != \2 ]] + compare_kubectl statefulset/upgrade-proxysql-pxc + local resource=statefulset/upgrade-proxysql-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc.yml + local new_result=/tmp/tmp.w6DN2DTbg5/statefulset_upgrade-proxysql-pxc.yml + desc 'compare statefulset/upgrade-proxysql-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/upgrade-proxysql-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-eks.yml ']' + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + version_gt 1.33 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k129.yml ']' + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k127.yml ']' + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-oc.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-aks.yml ']' + kubectl_bin get -o yaml statefulset/upgrade-proxysql-pxc + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("upgrade-proxysql-31261", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.qh9zLqg90k ++ mktemp + local LAST_ERR=/tmp/tmp.I1lcalGJT6 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/upgrade-proxysql-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.qh9zLqg90k + cat /tmp/tmp.I1lcalGJT6 + rm /tmp/tmp.qh9zLqg90k /tmp/tmp.I1lcalGJT6 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc.yml /tmp/tmp.w6DN2DTbg5/statefulset_upgrade-proxysql-pxc.yml + compare_kubectl statefulset/upgrade-proxysql-proxysql + local resource=statefulset/upgrade-proxysql-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql.yml + local new_result=/tmp/tmp.w6DN2DTbg5/statefulset_upgrade-proxysql-proxysql.yml + desc 'compare statefulset/upgrade-proxysql-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/upgrade-proxysql-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-eks.yml ']' + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.0 ]] + [[ percona/percona-xtradb-cluster:5.7.44-31.65 =~ 8\.4 ]] + version_gt 1.33 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k129.yml ']' + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k127.yml ']' + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-oc.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-aks.yml ']' + kubectl_bin get -o yaml statefulset/upgrade-proxysql-proxysql ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("upgrade-proxysql-31261", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.VUdjfwhHfs ++ mktemp + local LAST_ERR=/tmp/tmp.NGe05qghY9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/upgrade-proxysql-proxysql + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VUdjfwhHfs + cat /tmp/tmp.NGe05qghY9 + rm /tmp/tmp.VUdjfwhHfs /tmp/tmp.NGe05qghY9 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2207/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql.yml /tmp/tmp.w6DN2DTbg5/statefulset_upgrade-proxysql-proxysql.yml + desc cleanup + set +o xtrace ----------------------------------------------------------------------------------- cleanup ----------------------------------------------------------------------------------- + destroy upgrade-proxysql-31261 + local namespace=upgrade-proxysql-31261 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v 'the object has been modified' + grep -v level=info + grep -v 'get backup status: Job.batch' ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ + sort -u + tee /tmp/tmp.w6DN2DTbg5/operator.log + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' +++ grep -c percona-xtradb-cluster-operator +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.cs7z0n0aDa +++ mktemp ++ local LAST_ERR=/tmp/tmp.mvxLYhR7nD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cs7z0n0aDa ++ cat /tmp/tmp.mvxLYhR7nD ++ rm /tmp/tmp.cs7z0n0aDa /tmp/tmp.mvxLYhR7nD ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-5b676b9b4d-hr9qw ++ mktemp + local LAST_OUT=/tmp/tmp.q3ntUbIbNc ++ mktemp + local LAST_ERR=/tmp/tmp.AwClYJTaGN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-5b676b9b4d-hr9qw + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.q3ntUbIbNc + cat /tmp/tmp.AwClYJTaGN + rm /tmp/tmp.q3ntUbIbNc /tmp/tmp.AwClYJTaGN + return 0 2025-10-10T11:07:06.930Z INFO setup Manager starting up {"gitCommit": "f8e092d7031c2931d0d1772ac8045385e44e3ff9", "gitBranch": "PR-2207-f8e092d7", "buildTime": "2025-10-10T08:21:44Z", "goVersion": "go1.24.8", "os": "linux", "arch": "amd64"} 2025-10-10T11:07:06.930Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.31.13-gke.1008000"} 2025-10-10T11:07:06.933Z INFO setup Registering Components. 2025-10-10T11:07:09.343Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2025-10-10T11:07:09.343Z INFO controller-runtime.metrics Starting metrics server 2025-10-10T11:07:09.343Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2025-10-10T11:07:09.343Z INFO controller-runtime.webhook Starting webhook server 2025-10-10T11:07:09.343Z INFO setup Starting the Cmd. 2025-10-10T11:07:09.343Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2025-10-10T11:07:09.344Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2025-10-10T11:07:09.344Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2025-10-10T11:07:09.344Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2025-10-10T11:07:09.444Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2025-10-10T11:07:25.357Z DEBUG events percona-xtradb-cluster-operator-5b676b9b4d-hr9qw_122b1d05-1de7-4f11-b044-4157c174eda1 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"dfd25be1-f2a6-45fe-a357-29c3b8403b7a","apiVersion":"coordination.k8s.io/v1","resourceVersion":"1760094445352159009"}, "reason": "LeaderElection"} 2025-10-10T11:07:25.357Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2025-10-10T11:07:25.358Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2025-10-10T11:07:25.358Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2025-10-10T11:07:25.358Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.Secret"} 2025-10-10T11:07:25.358Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2025-10-10T11:07:25.458Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2025-10-10T11:07:25.458Z INFO Starting Controller {"controller": "pxc-controller"} 2025-10-10T11:07:25.458Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2025-10-10T11:07:25.458Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2025-10-10T11:07:25.559Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2025-10-10T11:07:25.559Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2025-10-10T11:07:25.827Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:07:26.002Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:07:26.026Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:07:26.071Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:07:27.415Z INFO Creating or updating backup job {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1", "name": "a278a-daily-backup", "schedule": "0 0 * * *"} 2025-10-10T11:07:28.203Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "c88a8224-09fc-4204-b55e-0b9077a63cd1"} 2025-10-10T11:07:34.641Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "373d440b-b48c-4a23-b9a4-e131fc27ea46"} 2025-10-10T11:07:41.267Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "13541b3b-58f8-4e2f-aa2f-9659cbf9d4f3"} 2025-10-10T11:07:47.495Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "0054d8cc-6075-43ca-a798-5c6eedf9c9ba"} 2025-10-10T11:07:53.533Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "3cd20cef-6311-4353-b794-f910b784febb"} 2025-10-10T11:07:59.880Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "f84dea26-94e6-417b-97e6-2c67d00ed6c7"} 2025-10-10T11:08:05.751Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:08:05.800Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-10-10T11:08:06.857Z INFO statefulSet was changed, run smart update {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa"} 2025-10-10T11:08:06.862Z INFO apply changes to secondary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2"} 2025-10-10T11:08:06.862Z INFO primary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0.upgrade-proxysql-pxc.upgrade-proxysql-31261.svc.cluster.local"} 2025-10-10T11:08:07.138Z ERROR sync users {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "e9bc02a7-06c1-412a-8d54-0528bb291727", "error": "exec syncusers: failed to execute command in pod: unable to upgrade connection: container not found (\"proxysql\") / \nSyncing user accounts from PXC(upgrade-proxysql-pxc-0.upgrade-proxysql-pxc.upgrade-proxysql-31261.svc.cluster.local:3306) to ProxySQL\n / ", "errorVerbose": "exec syncusers: failed to execute command in pod: unable to upgrade connection: container not found (\"proxysql\") / \nSyncing user accounts from PXC(upgrade-proxysql-pxc-0.upgrade-proxysql-pxc.upgrade-proxysql-31261.svc.cluster.local:3306) to ProxySQL\n / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:966\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:867\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1700"} 2025-10-10T11:08:07.687Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:08:17.837Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:08:27.832Z INFO Pod is not running {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2", "phase": "Pending"} 2025-10-10T11:08:27.832Z INFO pod is waiting {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2", "reason": "PodInitializing"} 2025-10-10T11:09:07.806Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2"} 2025-10-10T11:09:17.819Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2"} 2025-10-10T11:09:17.824Z INFO apply changes to secondary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1"} 2025-10-10T11:09:17.824Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-2"} 2025-10-10T11:09:18.085Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:09:28.192Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:09:38.215Z INFO Pod is not running {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1", "phase": "Pending"} 2025-10-10T11:09:38.215Z INFO pod is waiting {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1", "reason": "PodInitializing"} 2025-10-10T11:10:18.250Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1"} 2025-10-10T11:10:38.265Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1"} 2025-10-10T11:10:38.270Z INFO apply changes to primary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0"} 2025-10-10T11:10:38.270Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-1"} 2025-10-10T11:10:38.482Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:10:48.592Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0", "currentRevision": "upgrade-proxysql-pxc-cf95466f8", "targetRevision": "upgrade-proxysql-pxc-77f6c6c677"} 2025-10-10T11:11:28.607Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0"} 2025-10-10T11:12:58.623Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0"} 2025-10-10T11:12:58.627Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "pod": "upgrade-proxysql-pxc-0"} 2025-10-10T11:12:58.627Z INFO smart update finished {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa"} 2025-10-10T11:12:58.677Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "5c5d43e4-46bc-4782-b664-d9855295fbaa", "new version": "5.7.44-48-57"} 2025-10-10T11:13:01.665Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "ec4821a0-61f7-4fb8-9ed3-23da40dc981a"} 2025-10-10T11:13:06.145Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "a672912d-c66c-4737-8077-9bfdac80398f"} 2025-10-10T11:13:13.158Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "4fd7e869-af29-42b2-9b84-1182c5dd4d71"} 2025-10-10T11:13:18.870Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "97cbe534-08e9-4f8d-b7d1-233f49a9495f"} 2025-10-10T11:13:25.335Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "4da41e29-c294-4d0c-a0d1-f6dcb54baadc"} 2025-10-10T11:13:31.384Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-31261", "name": "upgrade-proxysql", "reconcileID": "bf60508c-164f-4428-b148-df51461b8eb6"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:869 + grep -v NAMESPACE + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n upgrade-proxysql-31261 upgrade-proxysql --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/upgrade-proxysql patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.8moV2fD1Ks ++ mktemp + local LAST_ERR=/tmp/tmp.T3dY0XHdwG + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8moV2fD1Ks perconaxtradbcluster.pxc.percona.com "upgrade-proxysql" deleted from upgrade-proxysql-31261 namespace + cat /tmp/tmp.T3dY0XHdwG + rm /tmp/tmp.8moV2fD1Ks /tmp/tmp.T3dY0XHdwG + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.ho2XKVqYwB ++ mktemp + local LAST_ERR=/tmp/tmp.2u0vWr9aqj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ho2XKVqYwB No resources found + cat /tmp/tmp.2u0vWr9aqj + rm /tmp/tmp.ho2XKVqYwB /tmp/tmp.2u0vWr9aqj + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.WxhskxbsHK ++ mktemp + local LAST_ERR=/tmp/tmp.iA3BKzOIuw + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WxhskxbsHK No resources found + cat /tmp/tmp.iA3BKzOIuw + rm /tmp/tmp.WxhskxbsHK /tmp/tmp.iA3BKzOIuw + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.aKNu4rL0xD ++ mktemp + local LAST_ERR=/tmp/tmp.utIkg5y3G3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.aKNu4rL0xD validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.utIkg5y3G3 + rm /tmp/tmp.aKNu4rL0xD /tmp/tmp.utIkg5y3G3 + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + rm -rf /tmp/tmp.w6DN2DTbg5 + kubectl_bin delete --grace-period=0 --force=true namespace upgrade-proxysql-31261 + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.cXliTTnkLT + local LAST_OUT=/tmp/tmp.FMTWL83ROx ++ mktemp ++ kubectl get crd ++ mktemp ++ grep perconaxtradbcluster + local LAST_ERR=/tmp/tmp.ab11KR2BIC + local exit_status=0 ++ awk '{print $1}' ++ tr '\n' ' ' + local LAST_ERR=/tmp/tmp.kwpZV4QCXc + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace upgrade-proxysql-31261 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + kubectl delete crd perconaxtradbclusterbackups.pxc.percona.com perconaxtradbclusterrestores.pxc.percona.com perconaxtradbclusters.pxc.percona.com customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusterbackups.pxc.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusterrestores.pxc.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusters.pxc.percona.com" deleted + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed -----------------------------------------------------------------------------------