Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/logs/upgrade-proxysql-8-0.log Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 + CLUSTER=upgrade-proxysql + CLUSTER_SIZE=3 + TARGET_OPERATOR_VER=1.19.0 + TARGET_IMAGE=perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 + TARGET_IMAGE_PXC=perconalab/percona-xtradb-cluster-operator:main-pxc8.0 + TARGET_IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest + TARGET_IMAGE_PROXY=perconalab/percona-xtradb-cluster-operator:main-proxysql + TARGET_IMAGE_HAPROXY=perconalab/percona-xtradb-cluster-operator:main-haproxy + TARGET_IMAGE_BACKUP=perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup + TARGET_IMAGE_LOGCOLLECTOR=perconalab/percona-xtradb-cluster-operator:main-logcollector + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 == *\p\e\r\c\o\n\a\-\x\t\r\a\d\b\-\c\l\u\s\t\e\r\-\o\p\e\r\a\t\o\r* ]] ++ echo -n perconalab/percona-xtradb-cluster-operator:main-pxc8.0 ++ /usr/bin/sed -r 's/.*([0-9].[0-9])$/\1/' + PXC_VER=8.0 ++ curl -s https://check.percona.com/versions/v1/pxc-operator ++ jq -r '.versions[].operator' ++ sort -V ++ tail -n1 + INIT_OPERATOR_VER=1.18.0 + [[ 1.18.0 == \1\.\1\9\.\0 ]] + GIT_TAG=v1.18.0 ++ curl -s 'https://check.percona.com/versions/v1/pxc-operator/1.18.0/latest?databaseVersion=8.0' + INIT_OPERATOR_IMAGES='{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' + OPERATOR_NAME=percona-xtradb-cluster-operator ++ jq -r '.versions[].matrix.operator[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' + IMAGE=percona/percona-xtradb-cluster-operator:1.18.0 ++ echo perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 ++ cut -d/ -f1 + [[ perconalab == \p\e\r\c\o\n\a\l\a\b ]] + IMAGE=perconalab/percona-xtradb-cluster-operator:1.18.0 ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' ++ jq -r '.versions[].matrix.pxc[].imagePath' + IMAGE_PXC=percona/percona-xtradb-cluster:8.0.42-33.1 ++ jq -r '.versions[].matrix.pmm[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' ++ tail -n1 + IMAGE_PMM_CLIENT=percona/pmm-client:3.3.1 ++ jq -r '.versions[].matrix.proxysql[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' + IMAGE_PROXY=percona/proxysql2:2.7.3 ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' ++ jq -r '.versions[].matrix.haproxy[].imagePath' + IMAGE_HAPROXY=percona/haproxy:2.8.15 ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' ++ jq -r '.versions[].matrix.backup[].imagePath' + IMAGE_BACKUP=percona/percona-xtrabackup:8.0.35-34.1 ++ jq -r '.versions[].matrix.logCollector[].imagePath' ++ echo '{"versions":[{"product":"pxc-operator", "operator":"1.18.0", "matrix":{"mongod":{}, "pxc":{"8.0.42-33.1":{"imagePath":"percona/percona-xtradb-cluster:8.0.42-33.1", "imageHash":"476851339090e44bb72760ae718fc36beb73a6028a29459e849271649018d546", "imageHashArm64":"", "status":"recommended", "critical":false}}, "pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1", "imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3", "imageHashArm64":"", "status":"recommended", "critical":false}, "3.3.1":{"imagePath":"percona/pmm-client:3.3.1", "imageHash":"29a9bb1c69fef8bedc4d4a9ed0ae8224a8623fd3eb8676ef40b13fd044188cb4", "imageHashArm64":"", "status":"recommended", "critical":false}}, "proxysql":{"2.7.3":{"imagePath":"percona/proxysql2:2.7.3", "imageHash":"51fedf9de05e4f130d5b08388511536fb1e1050a24ffc21bedb0f0b61a236567", "imageHashArm64":"", "status":"recommended", "critical":false}}, "haproxy":{"2.8.15":{"imagePath":"percona/haproxy:2.8.15", "imageHash":"49e6987a1c8b27e9111ae1f1168dd51f2840eb6d939ffc157358f0f259819006", "imageHashArm64":"", "status":"recommended", "critical":false}}, "backup":{"8.0.35":{"imagePath":"percona/percona-xtrabackup:8.0.35-34.1", "imageHash":"2dc127b08971051296d421b22aa861bb0330cf702b4b0246ae31053b0f01911e", "imageHashArm64":"", "status":"recommended", "critical":false}}, "operator":{"1.18.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.18.0", "imageHash":"0eca0b096482c7d09792c15fee00dbdcd0fbf3cd487dab60eb2774b025681e85", "imageHashArm64":"bdb7a0ff6b78e98b16f8b521e91682202b6d404202283b34b8168013d5c06356", "status":"recommended", "critical":false}}, "logCollector":{"4.0.1":{"imagePath":"percona/fluentbit:4.0.1", "imageHash":"a4ab7dd10379ccf74607f6b05225c4996eeff53b628bda94e615781a1f58b779", "imageHashArm64":"", "status":"recommended", "critical":false}}, "postgresql":{}, "pgbackrest":{}, "pgbackrestRepo":{}, "pgbadger":{}, "pgbouncer":{}, "pxcOperator":{}, "psmdbOperator":{}, "pgOperatorApiserver":{}, "pgOperatorEvent":{}, "pgOperatorRmdata":{}, "pgOperatorScheduler":{}, "pgOperator":{}, "pgOperatorDeployer":{}, "psOperator":{}, "mysql":{}, "router":{}, "orchestrator":{}, "toolkit":{}, "postgis":{}}}]}' + IMAGE_LOGCOLLECTOR=percona/fluentbit:4.0.1 + [[ -n '' ]] + [[ 1.19.0 == \1\.\1\8\.\0 ]] + main + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.tLmBg4gQiR ++ mktemp + local LAST_ERR=/tmp/tmp.a0BoNa2p0U + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.tLmBg4gQiR namespace/cert-manager created + cat /tmp/tmp.a0BoNa2p0U + rm /tmp/tmp.tLmBg4gQiR /tmp/tmp.a0BoNa2p0U + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.HoQe1LxiOI ++ mktemp + local LAST_ERR=/tmp/tmp.oCAfToLCtR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.HoQe1LxiOI namespace/cert-manager labeled + cat /tmp/tmp.oCAfToLCtR + rm /tmp/tmp.HoQe1LxiOI /tmp/tmp.oCAfToLCtR + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.ncVdWxeCtr ++ mktemp + local LAST_ERR=/tmp/tmp.jVbMhwI54h + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ncVdWxeCtr namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.jVbMhwI54h Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.ncVdWxeCtr /tmp/tmp.jVbMhwI54h + return 0 + '[' '' == 4.10 ']' + sleep 70 + create_infra_gh upgrade-proxysql-27702 v1.18.0 + local ns=upgrade-proxysql-27702 + local git_tag=v1.18.0 + '[' -n pxc-operator ']' + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + xargs kubectl delete ns + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.EIv2HuMlC9 + local LAST_OUT=/tmp/tmp.jNoV76h1c2 ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.p8KWaFk5q2 + local exit_status=0 + local LAST_ERR=/tmp/tmp.WNOigbYIpR + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.jNoV76h1c2 + cat /tmp/tmp.WNOigbYIpR + rm /tmp/tmp.jNoV76h1c2 /tmp/tmp.WNOigbYIpR + return 0 namespace "cert-manager" deleted namespace "upgrade-proxysql-9677" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.EIv2HuMlC9 namespace "pxc-operator" deleted + cat /tmp/tmp.p8KWaFk5q2 + rm /tmp/tmp.EIv2HuMlC9 /tmp/tmp.p8KWaFk5q2 + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.0NnX65b4yh ++ mktemp + local LAST_ERR=/tmp/tmp.hnwQgUYcF4 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0NnX65b4yh namespace/pxc-operator created + cat /tmp/tmp.hnwQgUYcF4 + rm /tmp/tmp.0NnX65b4yh /tmp/tmp.hnwQgUYcF4 + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.dYQyxeymoZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.niV1H3bvZY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dYQyxeymoZ ++ cat /tmp/tmp.niV1H3bvZY ++ rm /tmp/tmp.dYQyxeymoZ /tmp/tmp.niV1H3bvZY ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.FKUnoXGoPu ++ mktemp + local LAST_ERR=/tmp/tmp.EFKxkPzUOk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.FKUnoXGoPu Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5" modified. + cat /tmp/tmp.EFKxkPzUOk + rm /tmp/tmp.FKUnoXGoPu /tmp/tmp.EFKxkPzUOk + return 0 + deploy_operator_gh v1.18.0 + local git_tag=v1.18.0 + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- ++ kubectl_bin get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bLOFVlbaOP +++ mktemp ++ local LAST_ERR=/tmp/tmp.G6Ism7h6hX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bLOFVlbaOP ++ cat /tmp/tmp.G6Ism7h6hX ++ rm /tmp/tmp.bLOFVlbaOP /tmp/tmp.G6Ism7h6hX ++ return 0 + [[ -n perconaxtradbclusters.pxc.percona.com ]] ++ kubectl_bin get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-18-0")].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2kz4OhqetD +++ mktemp ++ local LAST_ERR=/tmp/tmp.sOJVmHtXxa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-18-0")].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2kz4OhqetD ++ cat /tmp/tmp.sOJVmHtXxa ++ rm /tmp/tmp.2kz4OhqetD /tmp/tmp.sOJVmHtXxa ++ return 0 + [[ -n '' ]] + kubectl_bin apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.3W5lbG9NRD ++ mktemp + local LAST_ERR=/tmp/tmp.WC7Aldzdbe + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.3W5lbG9NRD + cat /tmp/tmp.WC7Aldzdbe + rm /tmp/tmp.3W5lbG9NRD /tmp/tmp.WC7Aldzdbe + return 0 + local rbac_yaml=rbac + local operator_yaml=operator.yaml + '[' -n pxc-operator ']' + rbac_yaml=cw-rbac + operator_yaml=cw-operator.yaml + apply_rbac_gh cw-rbac v1.18.0 + local operator_namespace=pxc-operator + local rbac=cw-rbac + local git_tag=v1.18.0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cw-rbac.yaml + /usr/bin/sed -i -e 's^namespace: .*^namespace: pxc-operator^' /tmp/tmp.PLm7hERkDw/rbac_v1.18.0.yaml + kubectl_bin apply -f /tmp/tmp.PLm7hERkDw/rbac_v1.18.0.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.TXSypcEacW ++ mktemp + local LAST_ERR=/tmp/tmp.Tu6OH5EDDq + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /tmp/tmp.PLm7hERkDw/rbac_v1.18.0.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.TXSypcEacW clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.Tu6OH5EDDq + rm /tmp/tmp.TXSypcEacW /tmp/tmp.Tu6OH5EDDq + return 0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cw-operator.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:1.18.0^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' + cat /tmp/tmp.PLm7hERkDw/cw-operator.yaml_v1.18.0.yaml + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' + kubectl_bin apply -n pxc-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.I1qUr2UUtE ++ mktemp + local LAST_ERR=/tmp/tmp.3z1ylUj4oT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n pxc-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.I1qUr2UUtE deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.3z1ylUj4oT + rm /tmp/tmp.I1qUr2UUtE /tmp/tmp.3z1ylUj4oT + return 0 + sleep 2 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.wXeOtjnzf9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.QYjJ4QYZjP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wXeOtjnzf9 ++ cat /tmp/tmp.QYjJ4QYZjP ++ rm /tmp/tmp.wXeOtjnzf9 /tmp/tmp.QYjJ4QYZjP ++ return 0 + wait_pod percona-xtradb-cluster-operator-85f65db574-f8s87 + local pod=percona-xtradb-cluster-operator-85f65db574-f8s87 + local max_retry=480 + local ns= ++ echo percona-xtradb-cluster-operator-85f65db574-f8s87 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-85f65db574-f8s87 condition met waiting for pod/percona-xtradb-cluster-operator-85f65db574-f8s87 to become Ready.Ok + create_namespace upgrade-proxysql-27702 + local namespace=upgrade-proxysql-27702 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces upgrade-proxysql-27702' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces upgrade-proxysql-27702 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace upgrade-proxysql-27702 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.48mY34ykxZ + local LAST_OUT=/tmp/tmp.K8dHagfLkA ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.6NRZqv3rCl + local exit_status=0 + local LAST_ERR=/tmp/tmp.S0Y4JWDmg2 + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + for i in '$(seq 0 2)' + set +e + kubectl get ns + kubectl delete namespace upgrade-proxysql-27702 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace upgrade-proxysql-27702 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.48mY34ykxZ + cat /tmp/tmp.6NRZqv3rCl + rm /tmp/tmp.48mY34ykxZ /tmp/tmp.6NRZqv3rCl + return 0 error: resource(s) were provided, but no name was specified + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace upgrade-proxysql-27702 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.K8dHagfLkA + cat /tmp/tmp.S0Y4JWDmg2 Error from server (NotFound): namespaces "upgrade-proxysql-27702" not found + rm /tmp/tmp.K8dHagfLkA /tmp/tmp.S0Y4JWDmg2 + return 1 + : + wait_for_delete namespace/upgrade-proxysql-27702 + local res=namespace/upgrade-proxysql-27702 + echo -n 'waiting for namespace/upgrade-proxysql-27702 to be deleted' waiting for namespace/upgrade-proxysql-27702 to be deleted+ set +o xtrace Error from server (NotFound): namespaces "upgrade-proxysql-27702" not found + desc 'create namespace upgrade-proxysql-27702' + set +o xtrace ----------------------------------------------------------------------------------- create namespace upgrade-proxysql-27702 ----------------------------------------------------------------------------------- + kubectl_bin create namespace upgrade-proxysql-27702 ++ mktemp + local LAST_OUT=/tmp/tmp.m7K1dT01RR ++ mktemp + local LAST_ERR=/tmp/tmp.HvgAAhcIYO + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace upgrade-proxysql-27702 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.m7K1dT01RR namespace/upgrade-proxysql-27702 created + cat /tmp/tmp.HvgAAhcIYO + rm /tmp/tmp.m7K1dT01RR /tmp/tmp.HvgAAhcIYO + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.5Yg8R5MjNl +++ mktemp ++ local LAST_ERR=/tmp/tmp.tGbwskLZtd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5Yg8R5MjNl ++ cat /tmp/tmp.tGbwskLZtd ++ rm /tmp/tmp.5Yg8R5MjNl /tmp/tmp.tGbwskLZtd ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=upgrade-proxysql-27702 ++ mktemp + local LAST_OUT=/tmp/tmp.9Z0wSDWT5Z ++ mktemp + local LAST_ERR=/tmp/tmp.q5YJRqvTmN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=upgrade-proxysql-27702 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9Z0wSDWT5Z Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5" modified. + cat /tmp/tmp.q5YJRqvTmN + rm /tmp/tmp.9Z0wSDWT5Z /tmp/tmp.q5YJRqvTmN + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.HucSS7UTwI ++ mktemp + local LAST_ERR=/tmp/tmp.CaQ21btQMb + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.HucSS7UTwI secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.CaQ21btQMb + rm /tmp/tmp.HucSS7UTwI /tmp/tmp.CaQ21btQMb + return 0 + local proxy=proxysql + local cr_yaml=/tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + prepare_cr_yaml /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml proxysql upgrade-proxysql 3 v1.18.0 + local cr_yaml=/tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + local proxy=proxysql + local cluster=upgrade-proxysql + local cluster_size=3 + local git_tag=v1.18.0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.18.0/deploy/cr.yaml + yq eval ' .metadata.name = "upgrade-proxysql" | .spec.secretsName = "my-cluster-secrets" | .spec.vaultSecretName = "some-name-vault" | .spec.sslSecretName = "some-name-ssl" | .spec.sslInternalSecretName = "some-name-ssl-internal" | .spec.upgradeOptions.apply = "disabled" | .spec.pxc.size = 3 | .spec.proxysql.size = 3 | .spec.haproxy.size = 3 | .spec.pxc.image = "-pxc" | .spec.proxysql.image = "-proxysql" | .spec.haproxy.image = "-haproxy" | .spec.backup.image = "-backup" | .spec.backup.storages.minio.s3.credentialsSecret = "minio-secret" | .spec.backup.storages.minio.s3.region = "us-east-1" | .spec.backup.storages.minio.s3.bucket = "operator-testing" | .spec.backup.storages.minio.s3.endpointUrl = "http://minio-service.#namespace:9000/" | .spec.backup.storages.minio.type = "s3" | .spec.pmm.image = "-pmm" ' - + [[ proxysql == \h\a\p\r\o\x\y ]] + yq -i eval ' .spec.haproxy.enabled = false | .spec.proxysql.enabled = true ' /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + [[ -n '' ]] + spinup_pxc upgrade-proxysql /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml 3 30 /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/secrets_without_tls.yml + local cluster=upgrade-proxysql + local config=/tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + local size=3 + local sleep=30 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.EnThV7KoDj ++ mktemp + local LAST_ERR=/tmp/tmp.K7fdb5YzEC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.EnThV7KoDj secret/my-cluster-secrets created + cat /tmp/tmp.K7fdb5YzEC + rm /tmp/tmp.EnThV7KoDj /tmp/tmp.K7fdb5YzEC + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:1.18.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: percona/pmm-client:3.3.1#' + local LAST_OUT=/tmp/tmp.sbrJTwQihs + /usr/bin/sed -e 's#image:.*-haproxy$#image: percona/haproxy:2.8.15#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: percona/percona-xtradb-cluster:8.0.42-33.1#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: percona/proxysql2:2.7.3#' ++ mktemp + /usr/bin/sed -e 's#image:.*-backup$#image: percona/percona-xtrabackup:8.0.35-34.1#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: percona/fluentbit:4.0.1#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.upgrade-proxysql-27702~ + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.loudtsdzxx + local exit_status=0 + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: percona/percona-xtradb-cluster:8.0.42-33.1#' ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.sbrJTwQihs deployment.apps/pxc-client created + cat /tmp/tmp.loudtsdzxx + rm /tmp/tmp.sbrJTwQihs /tmp/tmp.loudtsdzxx + return 0 + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + apply_config /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + '[' -z '' ']' + cat_config /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + kubectl_bin apply -f - + cat /tmp/tmp.PLm7hERkDw/cr_1.18.0_proxysql.yaml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: percona/percona-xtradb-cluster:8.0.42-33.1#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: percona/percona-xtradb-cluster:8.0.42-33.1#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:1.18.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: percona/pmm-client:3.3.1#' + local LAST_OUT=/tmp/tmp.PmSdGzFXxv ++ mktemp + /usr/bin/sed -e s~minio-service.#namespace~minio-service.upgrade-proxysql-27702~ + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: percona/proxysql2:2.7.3#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: percona/fluentbit:4.0.1#' + /usr/bin/sed -e 's#image:.*-backup$#image: percona/percona-xtrabackup:8.0.35-34.1#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: percona/haproxy:2.8.15#' + local LAST_ERR=/tmp/tmp.dvSDK2FoHz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PmSdGzFXxv perconaxtradbcluster.pxc.percona.com/upgrade-proxysql created + cat /tmp/tmp.dvSDK2FoHz + rm /tmp/tmp.PmSdGzFXxv /tmp/tmp.dvSDK2FoHz + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy upgrade-proxysql ++ local target_cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.23mFnhU6om ++++ mktemp +++ local LAST_ERR=/tmp/tmp.htaPuCHv9n +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.23mFnhU6om +++ cat /tmp/tmp.htaPuCHv9n +++ rm /tmp/tmp.23mFnhU6om /tmp/tmp.htaPuCHv9n +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.lg3yDk0hBa ++++ mktemp +++ local LAST_ERR=/tmp/tmp.oY79dWE4Wr +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.lg3yDk0hBa +++ cat /tmp/tmp.oY79dWE4Wr +++ rm /tmp/tmp.lg3yDk0hBa /tmp/tmp.oY79dWE4Wr +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo upgrade-proxysql-proxysql ++ return + local proxy=upgrade-proxysql-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-27702 ++ mktemp + local LAST_OUT=/tmp/tmp.gCEu1LW9iE ++ mktemp + local LAST_ERR=/tmp/tmp.5qYroEU0Ec + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-27702 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-27702 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n upgrade-proxysql-27702 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.gCEu1LW9iE + cat /tmp/tmp.5qYroEU0Ec error: no matching resources found + rm /tmp/tmp.gCEu1LW9iE /tmp/tmp.5qYroEU0Ec + return 1 + true + wait_for_running upgrade-proxysql-proxysql 1 + local name=upgrade-proxysql-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-proxysql-0 480 + local pod=upgrade-proxysql-proxysql-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace Error from server (NotFound): pods "upgrade-proxysql-proxysql-0" not found waiting for pod/upgrade-proxysql-proxysql-0 to become Ready...............Ok + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok + sleep 30 ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.secretsName}' + local secret_name=my-cluster-secrets ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.5XhZIAOQ3w +++ mktemp ++ local LAST_ERR=/tmp/tmp.ShmqJsqMzv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5XhZIAOQ3w ++ cat /tmp/tmp.ShmqJsqMzv ++ rm /tmp/tmp.5XhZIAOQ3w /tmp/tmp.ShmqJsqMzv ++ return 0 + local root_pass=root_password + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.om7fBD7WlI +++ mktemp ++ local LAST_ERR=/tmp/tmp.OWdmPm4651 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.om7fBD7WlI ++ cat /tmp/tmp.OWdmPm4651 ++ rm /tmp/tmp.om7fBD7WlI /tmp/tmp.OWdmPm4651 ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h upgrade-proxysql-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ckc01nPFtM +++ mktemp ++ local LAST_ERR=/tmp/tmp.lkqiL8QDpJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ckc01nPFtM ++ cat /tmp/tmp.lkqiL8QDpJ ++ rm /tmp/tmp.ckc01nPFtM /tmp/tmp.lkqiL8QDpJ ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4tr7XW2C0C +++ mktemp ++ local LAST_ERR=/tmp/tmp.lqtb88BhP5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4tr7XW2C0C ++ cat /tmp/tmp.lqtb88BhP5 ++ rm /tmp/tmp.4tr7XW2C0C /tmp/tmp.lqtb88BhP5 ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pC2FAc2QRF +++ mktemp ++ local LAST_ERR=/tmp/tmp.h4nOMfQkWb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pC2FAc2QRF ++ cat /tmp/tmp.h4nOMfQkWb ++ rm /tmp/tmp.pC2FAc2QRF /tmp/tmp.h4nOMfQkWb ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sd5PVAklbh +++ mktemp ++ local LAST_ERR=/tmp/tmp.kvCgSmVXnv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.sd5PVAklbh ++ cat /tmp/tmp.kvCgSmVXnv ++ rm /tmp/tmp.sd5PVAklbh /tmp/tmp.kvCgSmVXnv ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql ++ is_keyring_plugin_in_use upgrade-proxysql ++ local cluster=upgrade-proxysql ++ kubectl_bin exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ grep -E -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Br14otTOLz +++ mktemp ++ local LAST_ERR=/tmp/tmp.XUiGBSYKGA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it upgrade-proxysql-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Br14otTOLz ++ cat /tmp/tmp.XUiGBSYKGA Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.Br14otTOLz /tmp/tmp.XUiGBSYKGA ++ return 0 + '[' '' ']' + compare_generation 1 proxysql upgrade-proxysql + local generation=1 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 1 pxc upgrade-proxysql + local generation=1 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VTuaim1M4c +++ mktemp ++ local LAST_ERR=/tmp/tmp.cgB5cW2csZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VTuaim1M4c ++ cat /tmp/tmp.cgB5cW2csZ ++ rm /tmp/tmp.VTuaim1M4c /tmp/tmp.cgB5cW2csZ ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + for container in '"${containers[@]}"' + check_generation 1 proxysql upgrade-proxysql + local generation=1 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ToKTk279aw +++ mktemp ++ local LAST_ERR=/tmp/tmp.T7vupaB6IY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ToKTk279aw ++ cat /tmp/tmp.T7vupaB6IY ++ rm /tmp/tmp.ToKTk279aw /tmp/tmp.T7vupaB6IY ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + desc 'upgrade operator' + set +o xtrace ----------------------------------------------------------------------------------- upgrade operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.mFA8jRbLJl ++ mktemp + local LAST_ERR=/tmp/tmp.bBxX8FxaIc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mFA8jRbLJl customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.bBxX8FxaIc + rm /tmp/tmp.mFA8jRbLJl /tmp/tmp.bBxX8FxaIc + return 0 + [[ -n pxc-operator ]] + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: pxc-operator^' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.vbl7Emx42m ++ mktemp + local LAST_ERR=/tmp/tmp.pgbX3lwpA5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vbl7Emx42m clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.pgbX3lwpA5 + rm /tmp/tmp.vbl7Emx42m /tmp/tmp.pgbX3lwpA5 + return 0 + kubectl_bin patch deployment percona-xtradb-cluster-operator '-p{"spec":{"template":{"spec":{"containers":[{"name":"percona-xtradb-cluster-operator","image":"perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8"}]}}}}' -n pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.lSWwx7gdCR ++ mktemp + local LAST_ERR=/tmp/tmp.ybdgWPqU0R + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch deployment percona-xtradb-cluster-operator '-p{"spec":{"template":{"spec":{"containers":[{"name":"percona-xtradb-cluster-operator","image":"perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8"}]}}}}' -n pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.lSWwx7gdCR deployment.apps/percona-xtradb-cluster-operator patched + cat /tmp/tmp.ybdgWPqU0R + rm /tmp/tmp.lSWwx7gdCR /tmp/tmp.ybdgWPqU0R + return 0 + kubectl_bin rollout status deployment/percona-xtradb-cluster-operator -n pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.IgbaAPdHbt ++ mktemp + local LAST_ERR=/tmp/tmp.4exb4SSTrI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl rollout status deployment/percona-xtradb-cluster-operator -n pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.IgbaAPdHbt Waiting for deployment "percona-xtradb-cluster-operator" rollout to finish: 0 of 1 updated replicas are available... deployment "percona-xtradb-cluster-operator" successfully rolled out + cat /tmp/tmp.4exb4SSTrI + rm /tmp/tmp.IgbaAPdHbt /tmp/tmp.4exb4SSTrI + return 0 + sleep 10 + desc 'wait for operator upgrade' + set +o xtrace ----------------------------------------------------------------------------------- wait for operator upgrade ----------------------------------------------------------------------------------- + local i=0 + local max=60 ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' -n pxc-operator ++ grep -vc NAME ++ awk '{print $1}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CCCsAae6ax +++ mktemp ++ local LAST_ERR=/tmp/tmp.dYR0sv4B3L ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CCCsAae6ax ++ cat /tmp/tmp.dYR0sv4B3L ++ rm /tmp/tmp.CCCsAae6ax /tmp/tmp.dYR0sv4B3L ++ return 0 + [[ 1 -eq 1 ]] + '[' -n pxc-operator ']' ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.SIe1zGKk00 +++ mktemp ++ local LAST_ERR=/tmp/tmp.6KBcqpwrh3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SIe1zGKk00 ++ cat /tmp/tmp.6KBcqpwrh3 ++ rm /tmp/tmp.SIe1zGKk00 /tmp/tmp.6KBcqpwrh3 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.O7hOPyGszD ++ mktemp + local LAST_ERR=/tmp/tmp.6XtAQABDtD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.O7hOPyGszD Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5" modified. + cat /tmp/tmp.6XtAQABDtD + rm /tmp/tmp.O7hOPyGszD /tmp/tmp.6XtAQABDtD + return 0 ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' ++ grep perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 ++ awk '{print $1}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uzlu94qRT4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.g3H4UpijZp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'custom-columns=NAME:.metadata.name,IMAGE:.spec.containers[0].image' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uzlu94qRT4 ++ cat /tmp/tmp.g3H4UpijZp ++ rm /tmp/tmp.uzlu94qRT4 /tmp/tmp.g3H4UpijZp ++ return 0 + wait_pod percona-xtradb-cluster-operator-76fc758dcd-4d9d4 + local pod=percona-xtradb-cluster-operator-76fc758dcd-4d9d4 + local max_retry=480 + local ns= ++ echo percona-xtradb-cluster-operator-76fc758dcd-4d9d4 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-76fc758dcd-4d9d4 condition met waiting for pod/percona-xtradb-cluster-operator-76fc758dcd-4d9d4 to become Ready.Ok ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.AukSvBsbYw +++ mktemp ++ local LAST_ERR=/tmp/tmp.LBy5cZZNwm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AukSvBsbYw ++ cat /tmp/tmp.LBy5cZZNwm ++ rm /tmp/tmp.AukSvBsbYw /tmp/tmp.LBy5cZZNwm ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=upgrade-proxysql-27702 ++ mktemp + local LAST_OUT=/tmp/tmp.VutaFF1riX ++ mktemp + local LAST_ERR=/tmp/tmp.Aa0lhYO1qx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5 --namespace=upgrade-proxysql-27702 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VutaFF1riX Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2229-77a8e8a8-10-cluster5" modified. + cat /tmp/tmp.Aa0lhYO1qx + rm /tmp/tmp.VutaFF1riX /tmp/tmp.Aa0lhYO1qx + return 0 + desc 'check images and generation after operator upgrade' + set +o xtrace ----------------------------------------------------------------------------------- check images and generation after operator upgrade ----------------------------------------------------------------------------------- + check_pxc_liveness upgrade-proxysql 3 + local cluster=upgrade-proxysql + local cluster_size=3 + wait_cluster_consistency upgrade-proxysql 3 + local cluster_name=upgrade-proxysql + local cluster_size=3 + local proxy_size= + '[' -z '' ']' ++ get_proxy_size upgrade-proxysql ++ local cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.3NAqS3vWrp ++++ mktemp +++ local LAST_ERR=/tmp/tmp.ALZsmGauwM +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.3NAqS3vWrp +++ cat /tmp/tmp.ALZsmGauwM +++ rm /tmp/tmp.3NAqS3vWrp /tmp/tmp.ALZsmGauwM +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.nIBQkm1klB ++++ mktemp +++ local LAST_ERR=/tmp/tmp.6Ch7uVoMW0 +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.nIBQkm1klB +++ cat /tmp/tmp.6Ch7uVoMW0 +++ rm /tmp/tmp.nIBQkm1klB /tmp/tmp.6Ch7uVoMW0 +++ return 0 ++ [[ true == \t\r\u\e ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vGYZdJRdgY +++ mktemp ++ local LAST_ERR=/tmp/tmp.WtlLIdioRT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vGYZdJRdgY ++ cat /tmp/tmp.WtlLIdioRT ++ rm /tmp/tmp.vGYZdJRdgY /tmp/tmp.WtlLIdioRT ++ return 0 ++ return + proxy_size=3 + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/upgrade-proxysql to be ready' waiting for pxc/upgrade-proxysql to be ready++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gAQ4o92gTl +++ mktemp ++ local LAST_ERR=/tmp/tmp.6SnQyglwA2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gAQ4o92gTl ++ cat /tmp/tmp.6SnQyglwA2 ++ rm /tmp/tmp.gAQ4o92gTl /tmp/tmp.6SnQyglwA2 ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JgqyKfUKtn +++ mktemp ++ local LAST_ERR=/tmp/tmp.Dyc0uQcJ6u ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JgqyKfUKtn ++ cat /tmp/tmp.Dyc0uQcJ6u ++ rm /tmp/tmp.JgqyKfUKtn /tmp/tmp.Dyc0uQcJ6u ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine upgrade-proxysql +++ local cluster_name=upgrade-proxysql ++++ get_proxy upgrade-proxysql ++++ local target_cluster=upgrade-proxysql +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.NQGwvCVJke ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.F469cLUmp1 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.NQGwvCVJke +++++ cat /tmp/tmp.F469cLUmp1 +++++ rm /tmp/tmp.NQGwvCVJke /tmp/tmp.F469cLUmp1 +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.2NdP4TgVAC ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.is5Fb1RR2y +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.2NdP4TgVAC +++++ cat /tmp/tmp.is5Fb1RR2y +++++ rm /tmp/tmp.2NdP4TgVAC /tmp/tmp.is5Fb1RR2y +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo upgrade-proxysql-proxysql ++++ return +++ local cluster_proxy=upgrade-proxysql-proxysql +++ echo proxysql ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1crI2hND3S +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZoE2h2uyiB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1crI2hND3S ++ cat /tmp/tmp.ZoE2h2uyiB ++ rm /tmp/tmp.1crI2hND3S /tmp/tmp.ZoE2h2uyiB ++ return 0 + [[ 3 == \3 ]] + echo + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok ++ seq 0 2 + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.u7xTuoUhU9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.OkV90jSbZk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.u7xTuoUhU9 ++ cat /tmp/tmp.OkV90jSbZk ++ rm /tmp/tmp.u7xTuoUhU9 /tmp/tmp.OkV90jSbZk ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7TbxUbuAAm +++ mktemp ++ local LAST_ERR=/tmp/tmp.bKtQrFZ3dy ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7TbxUbuAAm ++ cat /tmp/tmp.bKtQrFZ3dy ++ rm /tmp/tmp.7TbxUbuAAm /tmp/tmp.bKtQrFZ3dy ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.r3T5nKU8Bh +++ mktemp ++ local LAST_ERR=/tmp/tmp.sA8v1SiWcz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.r3T5nKU8Bh ++ cat /tmp/tmp.sA8v1SiWcz ++ rm /tmp/tmp.r3T5nKU8Bh /tmp/tmp.sA8v1SiWcz ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql ++ kubectl_bin get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VZ2qulk6Yo +++ mktemp ++ local LAST_ERR=/tmp/tmp.W6poIQJCZx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VZ2qulk6Yo ++ cat /tmp/tmp.W6poIQJCZx ++ rm /tmp/tmp.VZ2qulk6Yo /tmp/tmp.W6poIQJCZx ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 == perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EepiZ3FmWt +++ mktemp ++ local LAST_ERR=/tmp/tmp.TrUFA8blKh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EepiZ3FmWt ++ cat /tmp/tmp.TrUFA8blKh ++ rm /tmp/tmp.EepiZ3FmWt /tmp/tmp.TrUFA8blKh ++ return 0 + [[ percona/proxysql2:2.7.3 == percona/proxysql2:2.7.3 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3tSf4x7HQY +++ mktemp ++ local LAST_ERR=/tmp/tmp.QnZ8lhNbu2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3tSf4x7HQY ++ cat /tmp/tmp.QnZ8lhNbu2 ++ rm /tmp/tmp.3tSf4x7HQY /tmp/tmp.QnZ8lhNbu2 ++ return 0 + [[ percona/haproxy:2.8.15 == percona/haproxy:2.8.15 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9UvSHsOeex +++ mktemp ++ local LAST_ERR=/tmp/tmp.LzLGH8HNTv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9UvSHsOeex ++ cat /tmp/tmp.LzLGH8HNTv ++ rm /tmp/tmp.9UvSHsOeex /tmp/tmp.LzLGH8HNTv ++ return 0 + [[ percona/percona-xtrabackup:8.0.35-34.1 == percona/percona-xtrabackup:8.0.35-34.1 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QQjiNcA4ec +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q1L5yoAZmG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QQjiNcA4ec ++ cat /tmp/tmp.Q1L5yoAZmG ++ rm /tmp/tmp.QQjiNcA4ec /tmp/tmp.Q1L5yoAZmG ++ return 0 + [[ percona/pmm-client:3.3.1 == percona/pmm-client:3.3.1 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AAbYmHZMCn +++ mktemp ++ local LAST_ERR=/tmp/tmp.eLjT3VpXAa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AAbYmHZMCn ++ cat /tmp/tmp.eLjT3VpXAa ++ rm /tmp/tmp.AAbYmHZMCn /tmp/tmp.eLjT3VpXAa ++ return 0 + [[ percona/fluentbit:4.0.1 == percona/fluentbit:4.0.1 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nE4yNx1RkD +++ mktemp ++ local LAST_ERR=/tmp/tmp.n8a3SELwWx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nE4yNx1RkD ++ cat /tmp/tmp.n8a3SELwWx ++ rm /tmp/tmp.nE4yNx1RkD /tmp/tmp.n8a3SELwWx ++ return 0 + [[ percona/percona-xtradb-cluster:8.0.42-33.1 == percona/percona-xtradb-cluster:8.0.42-33.1 ]] + : Operator image has been updated correctly + compare_generation 1 proxysql upgrade-proxysql + local generation=1 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 1 pxc upgrade-proxysql + local generation=1 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wsocAmCpTN +++ mktemp ++ local LAST_ERR=/tmp/tmp.bqtGSz54I6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wsocAmCpTN ++ cat /tmp/tmp.bqtGSz54I6 ++ rm /tmp/tmp.wsocAmCpTN /tmp/tmp.bqtGSz54I6 ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + for container in '"${containers[@]}"' + check_generation 1 proxysql upgrade-proxysql + local generation=1 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RceBDLiujO +++ mktemp ++ local LAST_ERR=/tmp/tmp.gzS16quqP5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RceBDLiujO ++ cat /tmp/tmp.gzS16quqP5 ++ rm /tmp/tmp.RceBDLiujO /tmp/tmp.gzS16quqP5 ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + desc 'patch pxc images and upgrade' + set +o xtrace ----------------------------------------------------------------------------------- patch pxc images and upgrade ----------------------------------------------------------------------------------- + kubectl_bin patch pxc upgrade-proxysql --type=merge --patch '{ "spec": { "crVersion": "1.19.0", "pxc": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc8.0" }, "pmm": { "image": "perconalab/pmm-client:dev-latest" }, "haproxy": { "image": "perconalab/percona-xtradb-cluster-operator:main-haproxy" }, "proxysql": { "image": "perconalab/percona-xtradb-cluster-operator:main-proxysql" }, "logcollector": { "image": "perconalab/percona-xtradb-cluster-operator:main-logcollector" }, "backup": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup" } }}' ++ mktemp + local LAST_OUT=/tmp/tmp.njFpN4EB5o ++ mktemp + local LAST_ERR=/tmp/tmp.IIAqUNawRj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc upgrade-proxysql --type=merge --patch '{ "spec": { "crVersion": "1.19.0", "pxc": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc8.0" }, "pmm": { "image": "perconalab/pmm-client:dev-latest" }, "haproxy": { "image": "perconalab/percona-xtradb-cluster-operator:main-haproxy" }, "proxysql": { "image": "perconalab/percona-xtradb-cluster-operator:main-proxysql" }, "logcollector": { "image": "perconalab/percona-xtradb-cluster-operator:main-logcollector" }, "backup": { "image": "perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup" } }}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.njFpN4EB5o perconaxtradbcluster.pxc.percona.com/upgrade-proxysql patched + cat /tmp/tmp.IIAqUNawRj + rm /tmp/tmp.njFpN4EB5o /tmp/tmp.IIAqUNawRj + return 0 + sleep 10 + desc 'check images and generation after full upgrade' + set +o xtrace ----------------------------------------------------------------------------------- check images and generation after full upgrade ----------------------------------------------------------------------------------- + check_pxc_liveness upgrade-proxysql 3 + local cluster=upgrade-proxysql + local cluster_size=3 + wait_cluster_consistency upgrade-proxysql 3 + local cluster_name=upgrade-proxysql + local cluster_size=3 + local proxy_size= + '[' -z '' ']' ++ get_proxy_size upgrade-proxysql ++ local cluster=upgrade-proxysql +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.IU7Yc2EySl ++++ mktemp +++ local LAST_ERR=/tmp/tmp.u5rmx2rmyM +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.IU7Yc2EySl +++ cat /tmp/tmp.u5rmx2rmyM +++ rm /tmp/tmp.IU7Yc2EySl /tmp/tmp.u5rmx2rmyM +++ return 0 ++ [[ false == \t\r\u\e ]] +++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.1WXFO4rcme ++++ mktemp +++ local LAST_ERR=/tmp/tmp.A9NOUUg7uF +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.1WXFO4rcme +++ cat /tmp/tmp.A9NOUUg7uF +++ rm /tmp/tmp.1WXFO4rcme /tmp/tmp.A9NOUUg7uF +++ return 0 ++ [[ true == \t\r\u\e ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.31qbjCBBFY +++ mktemp ++ local LAST_ERR=/tmp/tmp.XX0oA7mwI2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.size}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.31qbjCBBFY ++ cat /tmp/tmp.XX0oA7mwI2 ++ rm /tmp/tmp.31qbjCBBFY /tmp/tmp.XX0oA7mwI2 ++ return 0 ++ return + proxy_size=3 + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/upgrade-proxysql to be ready' waiting for pxc/upgrade-proxysql to be ready++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Fu5JXplaOW +++ mktemp ++ local LAST_ERR=/tmp/tmp.7F1f8mDID6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Fu5JXplaOW ++ cat /tmp/tmp.7F1f8mDID6 ++ rm /tmp/tmp.Fu5JXplaOW /tmp/tmp.7F1f8mDID6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 0 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.V2KfPMu0aw +++ mktemp ++ local LAST_ERR=/tmp/tmp.Tz2qd9pzhw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.V2KfPMu0aw ++ cat /tmp/tmp.Tz2qd9pzhw ++ rm /tmp/tmp.V2KfPMu0aw /tmp/tmp.Tz2qd9pzhw ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 1 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0QV5jKEoWe +++ mktemp ++ local LAST_ERR=/tmp/tmp.LYcZFbMmOM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0QV5jKEoWe ++ cat /tmp/tmp.LYcZFbMmOM ++ rm /tmp/tmp.0QV5jKEoWe /tmp/tmp.LYcZFbMmOM ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 2 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Rn6hJ6npHZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.Vx2yV8V88u ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Rn6hJ6npHZ ++ cat /tmp/tmp.Vx2yV8V88u ++ rm /tmp/tmp.Rn6hJ6npHZ /tmp/tmp.Vx2yV8V88u ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 3 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eYuCAyxfbl +++ mktemp ++ local LAST_ERR=/tmp/tmp.sucmfvUYih ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.eYuCAyxfbl ++ cat /tmp/tmp.sucmfvUYih ++ rm /tmp/tmp.eYuCAyxfbl /tmp/tmp.sucmfvUYih ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 4 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gxBl7VyFxy +++ mktemp ++ local LAST_ERR=/tmp/tmp.gciVLzzdaS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gxBl7VyFxy ++ cat /tmp/tmp.gciVLzzdaS ++ rm /tmp/tmp.gxBl7VyFxy /tmp/tmp.gciVLzzdaS ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 5 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2mGeqFRmzi +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q0ziV6YLgE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2mGeqFRmzi ++ cat /tmp/tmp.Q0ziV6YLgE ++ rm /tmp/tmp.2mGeqFRmzi /tmp/tmp.Q0ziV6YLgE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 6 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GChbGBk1VA +++ mktemp ++ local LAST_ERR=/tmp/tmp.ecs4QPolEk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GChbGBk1VA ++ cat /tmp/tmp.ecs4QPolEk ++ rm /tmp/tmp.GChbGBk1VA /tmp/tmp.ecs4QPolEk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 7 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.S5XgIa0Opx +++ mktemp ++ local LAST_ERR=/tmp/tmp.AUnnoF3d0H ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.S5XgIa0Opx ++ cat /tmp/tmp.AUnnoF3d0H ++ rm /tmp/tmp.S5XgIa0Opx /tmp/tmp.AUnnoF3d0H ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 8 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SxZIoG82Hf +++ mktemp ++ local LAST_ERR=/tmp/tmp.QrL9QDyJy9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SxZIoG82Hf ++ cat /tmp/tmp.QrL9QDyJy9 ++ rm /tmp/tmp.SxZIoG82Hf /tmp/tmp.QrL9QDyJy9 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 9 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZBrURqPl5e +++ mktemp ++ local LAST_ERR=/tmp/tmp.Xdhs9LRCMk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZBrURqPl5e ++ cat /tmp/tmp.Xdhs9LRCMk ++ rm /tmp/tmp.ZBrURqPl5e /tmp/tmp.Xdhs9LRCMk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 10 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fzE57RWXrZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.cRDZAZcVjm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fzE57RWXrZ ++ cat /tmp/tmp.cRDZAZcVjm ++ rm /tmp/tmp.fzE57RWXrZ /tmp/tmp.cRDZAZcVjm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 11 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YdnFnQaCex +++ mktemp ++ local LAST_ERR=/tmp/tmp.2MPuXnJCz2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YdnFnQaCex ++ cat /tmp/tmp.2MPuXnJCz2 ++ rm /tmp/tmp.YdnFnQaCex /tmp/tmp.2MPuXnJCz2 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 12 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IafzVAOtu1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.T5a9b10emC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.IafzVAOtu1 ++ cat /tmp/tmp.T5a9b10emC ++ rm /tmp/tmp.IafzVAOtu1 /tmp/tmp.T5a9b10emC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 13 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TjBMUK87Rx +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZPCLLmwcNL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TjBMUK87Rx ++ cat /tmp/tmp.ZPCLLmwcNL ++ rm /tmp/tmp.TjBMUK87Rx /tmp/tmp.ZPCLLmwcNL ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 14 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Y4GGrYRdtm +++ mktemp ++ local LAST_ERR=/tmp/tmp.Dg5WusylZE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Y4GGrYRdtm ++ cat /tmp/tmp.Dg5WusylZE ++ rm /tmp/tmp.Y4GGrYRdtm /tmp/tmp.Dg5WusylZE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 15 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zmbL33rjO4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.HMrisaqr5M ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zmbL33rjO4 ++ cat /tmp/tmp.HMrisaqr5M ++ rm /tmp/tmp.zmbL33rjO4 /tmp/tmp.HMrisaqr5M ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 16 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.57GhgtHMXZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.0qjOGzgnU0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.57GhgtHMXZ ++ cat /tmp/tmp.0qjOGzgnU0 ++ rm /tmp/tmp.57GhgtHMXZ /tmp/tmp.0qjOGzgnU0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 17 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.E60KFX4Fjh +++ mktemp ++ local LAST_ERR=/tmp/tmp.qKad5uiFJQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.E60KFX4Fjh ++ cat /tmp/tmp.qKad5uiFJQ ++ rm /tmp/tmp.E60KFX4Fjh /tmp/tmp.qKad5uiFJQ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 18 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CWk3fki5rf +++ mktemp ++ local LAST_ERR=/tmp/tmp.BCUYO71LbI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CWk3fki5rf ++ cat /tmp/tmp.BCUYO71LbI ++ rm /tmp/tmp.CWk3fki5rf /tmp/tmp.BCUYO71LbI ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 19 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Wx3cgZfKBA +++ mktemp ++ local LAST_ERR=/tmp/tmp.JUt4zENLai ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Wx3cgZfKBA ++ cat /tmp/tmp.JUt4zENLai ++ rm /tmp/tmp.Wx3cgZfKBA /tmp/tmp.JUt4zENLai ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 20 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZbxhVcBKoR +++ mktemp ++ local LAST_ERR=/tmp/tmp.iglSwEs05y ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZbxhVcBKoR ++ cat /tmp/tmp.iglSwEs05y ++ rm /tmp/tmp.ZbxhVcBKoR /tmp/tmp.iglSwEs05y ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 21 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VL41Z5zPWZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.rDLfdlI8J7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VL41Z5zPWZ ++ cat /tmp/tmp.rDLfdlI8J7 ++ rm /tmp/tmp.VL41Z5zPWZ /tmp/tmp.rDLfdlI8J7 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 22 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mktwohhPtx +++ mktemp ++ local LAST_ERR=/tmp/tmp.fHcmLr8unP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mktwohhPtx ++ cat /tmp/tmp.fHcmLr8unP ++ rm /tmp/tmp.mktwohhPtx /tmp/tmp.fHcmLr8unP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 23 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Sj4gE4dt0l +++ mktemp ++ local LAST_ERR=/tmp/tmp.RUeUKLg4Vl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Sj4gE4dt0l ++ cat /tmp/tmp.RUeUKLg4Vl ++ rm /tmp/tmp.Sj4gE4dt0l /tmp/tmp.RUeUKLg4Vl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 24 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rzZ6WwwlSF +++ mktemp ++ local LAST_ERR=/tmp/tmp.vW787aqUk0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rzZ6WwwlSF ++ cat /tmp/tmp.vW787aqUk0 ++ rm /tmp/tmp.rzZ6WwwlSF /tmp/tmp.vW787aqUk0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 25 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CBAsJm6uIj +++ mktemp ++ local LAST_ERR=/tmp/tmp.Hm0KkZex9T ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CBAsJm6uIj ++ cat /tmp/tmp.Hm0KkZex9T ++ rm /tmp/tmp.CBAsJm6uIj /tmp/tmp.Hm0KkZex9T ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 26 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fZ56YibKKn +++ mktemp ++ local LAST_ERR=/tmp/tmp.wTuu7aKot7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fZ56YibKKn ++ cat /tmp/tmp.wTuu7aKot7 ++ rm /tmp/tmp.fZ56YibKKn /tmp/tmp.wTuu7aKot7 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 27 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XWQotnjLSQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.8aExkY9VME ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XWQotnjLSQ ++ cat /tmp/tmp.8aExkY9VME ++ rm /tmp/tmp.XWQotnjLSQ /tmp/tmp.8aExkY9VME ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 28 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qYSg9nHQyM +++ mktemp ++ local LAST_ERR=/tmp/tmp.vn0XMawpsZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qYSg9nHQyM ++ cat /tmp/tmp.vn0XMawpsZ ++ rm /tmp/tmp.qYSg9nHQyM /tmp/tmp.vn0XMawpsZ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 29 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XQjPVd0Fvf +++ mktemp ++ local LAST_ERR=/tmp/tmp.2mGUVRpqrM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XQjPVd0Fvf ++ cat /tmp/tmp.2mGUVRpqrM ++ rm /tmp/tmp.XQjPVd0Fvf /tmp/tmp.2mGUVRpqrM ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 30 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vW27Ddyv7U +++ mktemp ++ local LAST_ERR=/tmp/tmp.qHBhXfuNdm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vW27Ddyv7U ++ cat /tmp/tmp.qHBhXfuNdm ++ rm /tmp/tmp.vW27Ddyv7U /tmp/tmp.qHBhXfuNdm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 31 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ruAhKc2lUh +++ mktemp ++ local LAST_ERR=/tmp/tmp.Lb736Jdswm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ruAhKc2lUh ++ cat /tmp/tmp.Lb736Jdswm ++ rm /tmp/tmp.ruAhKc2lUh /tmp/tmp.Lb736Jdswm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 32 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Mm0lcwHWzB +++ mktemp ++ local LAST_ERR=/tmp/tmp.DCVZ4MpXSG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Mm0lcwHWzB ++ cat /tmp/tmp.DCVZ4MpXSG ++ rm /tmp/tmp.Mm0lcwHWzB /tmp/tmp.DCVZ4MpXSG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 33 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8LMpkM1qiE +++ mktemp ++ local LAST_ERR=/tmp/tmp.bMBquKPRCN ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8LMpkM1qiE ++ cat /tmp/tmp.bMBquKPRCN ++ rm /tmp/tmp.8LMpkM1qiE /tmp/tmp.bMBquKPRCN ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 34 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0LK05H6Ylo +++ mktemp ++ local LAST_ERR=/tmp/tmp.P1te35LDZb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0LK05H6Ylo ++ cat /tmp/tmp.P1te35LDZb ++ rm /tmp/tmp.0LK05H6Ylo /tmp/tmp.P1te35LDZb ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 35 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PfNZT1wse5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.hhWi2zBl8m ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PfNZT1wse5 ++ cat /tmp/tmp.hhWi2zBl8m ++ rm /tmp/tmp.PfNZT1wse5 /tmp/tmp.hhWi2zBl8m ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 36 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dNAyC6KoRe +++ mktemp ++ local LAST_ERR=/tmp/tmp.RG1tH6nRjt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dNAyC6KoRe ++ cat /tmp/tmp.RG1tH6nRjt ++ rm /tmp/tmp.dNAyC6KoRe /tmp/tmp.RG1tH6nRjt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 37 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6YoyIc38FB +++ mktemp ++ local LAST_ERR=/tmp/tmp.14Ws9MqERG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6YoyIc38FB ++ cat /tmp/tmp.14Ws9MqERG ++ rm /tmp/tmp.6YoyIc38FB /tmp/tmp.14Ws9MqERG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 38 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wh4R60UWy0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.sFUiUhRmQf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wh4R60UWy0 ++ cat /tmp/tmp.sFUiUhRmQf ++ rm /tmp/tmp.wh4R60UWy0 /tmp/tmp.sFUiUhRmQf ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 39 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EWOEXqJCsy +++ mktemp ++ local LAST_ERR=/tmp/tmp.JErM5O7Zw6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EWOEXqJCsy ++ cat /tmp/tmp.JErM5O7Zw6 ++ rm /tmp/tmp.EWOEXqJCsy /tmp/tmp.JErM5O7Zw6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 40 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.W4ZmSTJawG +++ mktemp ++ local LAST_ERR=/tmp/tmp.SVYIAo9tdL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.W4ZmSTJawG ++ cat /tmp/tmp.SVYIAo9tdL ++ rm /tmp/tmp.W4ZmSTJawG /tmp/tmp.SVYIAo9tdL ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 41 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fAe7ijhOV7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.jsmN2iq5T8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fAe7ijhOV7 ++ cat /tmp/tmp.jsmN2iq5T8 ++ rm /tmp/tmp.fAe7ijhOV7 /tmp/tmp.jsmN2iq5T8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 42 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RLp9jFX1FD +++ mktemp ++ local LAST_ERR=/tmp/tmp.PqTENJjN5Z ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RLp9jFX1FD ++ cat /tmp/tmp.PqTENJjN5Z ++ rm /tmp/tmp.RLp9jFX1FD /tmp/tmp.PqTENJjN5Z ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 43 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ib0m5iQRbQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.wKPa3TnzQ8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Ib0m5iQRbQ ++ cat /tmp/tmp.wKPa3TnzQ8 ++ rm /tmp/tmp.Ib0m5iQRbQ /tmp/tmp.wKPa3TnzQ8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 44 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.X3FKW0Ph1a +++ mktemp ++ local LAST_ERR=/tmp/tmp.Hv6UO22kJo ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.X3FKW0Ph1a ++ cat /tmp/tmp.Hv6UO22kJo ++ rm /tmp/tmp.X3FKW0Ph1a /tmp/tmp.Hv6UO22kJo ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 45 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xCQu7S2ps9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.TBr7Y1Dzsj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xCQu7S2ps9 ++ cat /tmp/tmp.TBr7Y1Dzsj ++ rm /tmp/tmp.xCQu7S2ps9 /tmp/tmp.TBr7Y1Dzsj ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 46 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2sWTAggWNL +++ mktemp ++ local LAST_ERR=/tmp/tmp.sh40L0UCQH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2sWTAggWNL ++ cat /tmp/tmp.sh40L0UCQH ++ rm /tmp/tmp.2sWTAggWNL /tmp/tmp.sh40L0UCQH ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 47 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KgugeAihXe +++ mktemp ++ local LAST_ERR=/tmp/tmp.M43L32Xh4Q ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KgugeAihXe ++ cat /tmp/tmp.M43L32Xh4Q ++ rm /tmp/tmp.KgugeAihXe /tmp/tmp.M43L32Xh4Q ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 48 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VH0POdfAbc +++ mktemp ++ local LAST_ERR=/tmp/tmp.CXMg8Extnm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VH0POdfAbc ++ cat /tmp/tmp.CXMg8Extnm ++ rm /tmp/tmp.VH0POdfAbc /tmp/tmp.CXMg8Extnm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 49 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CVIngwVn0M +++ mktemp ++ local LAST_ERR=/tmp/tmp.aOSZGo96ws ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CVIngwVn0M ++ cat /tmp/tmp.aOSZGo96ws ++ rm /tmp/tmp.CVIngwVn0M /tmp/tmp.aOSZGo96ws ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 50 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.V9v7nFeBIz +++ mktemp ++ local LAST_ERR=/tmp/tmp.rLVPL7W9iL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.V9v7nFeBIz ++ cat /tmp/tmp.rLVPL7W9iL ++ rm /tmp/tmp.V9v7nFeBIz /tmp/tmp.rLVPL7W9iL ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 51 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CLPKIKhpNb +++ mktemp ++ local LAST_ERR=/tmp/tmp.oEur4hE8qE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CLPKIKhpNb ++ cat /tmp/tmp.oEur4hE8qE ++ rm /tmp/tmp.CLPKIKhpNb /tmp/tmp.oEur4hE8qE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 52 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pu3FrSk52h +++ mktemp ++ local LAST_ERR=/tmp/tmp.fuYc777NVN ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pu3FrSk52h ++ cat /tmp/tmp.fuYc777NVN ++ rm /tmp/tmp.pu3FrSk52h /tmp/tmp.fuYc777NVN ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 53 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KevVhIhIZo +++ mktemp ++ local LAST_ERR=/tmp/tmp.t3KNWU3foi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KevVhIhIZo ++ cat /tmp/tmp.t3KNWU3foi ++ rm /tmp/tmp.KevVhIhIZo /tmp/tmp.t3KNWU3foi ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oFtyPqSYS4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.23aapLxbp0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oFtyPqSYS4 ++ cat /tmp/tmp.23aapLxbp0 ++ rm /tmp/tmp.oFtyPqSYS4 /tmp/tmp.23aapLxbp0 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine upgrade-proxysql +++ local cluster_name=upgrade-proxysql ++++ get_proxy upgrade-proxysql ++++ local target_cluster=upgrade-proxysql +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.tOpeca2TV2 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.vRXtSVpKcZ +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.tOpeca2TV2 +++++ cat /tmp/tmp.vRXtSVpKcZ +++++ rm /tmp/tmp.tOpeca2TV2 /tmp/tmp.vRXtSVpKcZ +++++ return 0 ++++ [[ false == \t\r\u\e ]] +++++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.mG4NpxY1Uc ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.WSk4gn6hkz +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.mG4NpxY1Uc +++++ cat /tmp/tmp.WSk4gn6hkz +++++ rm /tmp/tmp.mG4NpxY1Uc /tmp/tmp.WSk4gn6hkz +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo upgrade-proxysql-proxysql ++++ return +++ local cluster_proxy=upgrade-proxysql-proxysql +++ echo proxysql ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LIg0H6Lsom +++ mktemp ++ local LAST_ERR=/tmp/tmp.xFErNYbWsr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LIg0H6Lsom ++ cat /tmp/tmp.xFErNYbWsr ++ rm /tmp/tmp.LIg0H6Lsom /tmp/tmp.xFErNYbWsr ++ return 0 + [[ 3 == \3 ]] + echo + wait_for_running upgrade-proxysql-pxc 3 + local name=upgrade-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-0 480 + local pod=upgrade-proxysql-pxc-0 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-0 condition met waiting for pod/upgrade-proxysql-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-1 480 + local pod=upgrade-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-1 condition met waiting for pod/upgrade-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod upgrade-proxysql-pxc-2 480 + local pod=upgrade-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo upgrade-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/upgrade-proxysql-pxc-2 condition met waiting for pod/upgrade-proxysql-pxc-2 to become Ready.Ok ++ seq 0 2 + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-0.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XSnSM3giQO +++ mktemp ++ local LAST_ERR=/tmp/tmp.NWmGzDGM5J ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XSnSM3giQO ++ cat /tmp/tmp.NWmGzDGM5J ++ rm /tmp/tmp.XSnSM3giQO /tmp/tmp.NWmGzDGM5J ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-1.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KApShfDduA +++ mktemp ++ local LAST_ERR=/tmp/tmp.3Oz4HoWJcO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KApShfDduA ++ cat /tmp/tmp.3Oz4HoWJcO ++ rm /tmp/tmp.KApShfDduA /tmp/tmp.3Oz4HoWJcO ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql + for i in '$(seq 0 $((cluster_size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1-80.sql ]] + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h upgrade-proxysql-pxc-2.upgrade-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vkiLYYgXSL +++ mktemp ++ local LAST_ERR=/tmp/tmp.sguEz6JWQ1 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vkiLYYgXSL ++ cat /tmp/tmp.sguEz6JWQ1 ++ rm /tmp/tmp.vkiLYYgXSL /tmp/tmp.sguEz6JWQ1 ++ return 0 + client_pod=pxc-client-7464c4947b-mtwdc + wait_pod pxc-client-7464c4947b-mtwdc + local pod=pxc-client-7464c4947b-mtwdc + local max_retry=480 + local ns= ++ echo pxc-client-7464c4947b-mtwdc ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-7464c4947b-mtwdc condition met waiting for pod/pxc-client-7464c4947b-mtwdc to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.PLm7hERkDw/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/select-1.sql /tmp/tmp.PLm7hERkDw/select-1.sql ++ kubectl_bin get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2KDeJooBL5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WOnVcMdsT0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pod -n pxc-operator --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[*].spec.containers[?(@.name == "percona-xtradb-cluster-operator")].image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2KDeJooBL5 ++ cat /tmp/tmp.WOnVcMdsT0 ++ rm /tmp/tmp.2KDeJooBL5 /tmp/tmp.WOnVcMdsT0 ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 == perconalab/percona-xtradb-cluster-operator:PR-2229-77a8e8a8 ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.y81B39b1NF +++ mktemp ++ local LAST_ERR=/tmp/tmp.EuhdyA3nXJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.proxysql.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.y81B39b1NF ++ cat /tmp/tmp.EuhdyA3nXJ ++ rm /tmp/tmp.y81B39b1NF /tmp/tmp.EuhdyA3nXJ ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-proxysql == perconalab/percona-xtradb-cluster-operator:main-proxysql ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FWDF2fTtL2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.7iRjMOqkjd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.haproxy.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FWDF2fTtL2 ++ cat /tmp/tmp.7iRjMOqkjd ++ rm /tmp/tmp.FWDF2fTtL2 /tmp/tmp.7iRjMOqkjd ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-haproxy == perconalab/percona-xtradb-cluster-operator:main-haproxy ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pUbqGoxM0r +++ mktemp ++ local LAST_ERR=/tmp/tmp.mQEQvzCIEe ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.backup.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pUbqGoxM0r ++ cat /tmp/tmp.mQEQvzCIEe ++ rm /tmp/tmp.pUbqGoxM0r /tmp/tmp.mQEQvzCIEe ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup == perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5P1pwM8lLj +++ mktemp ++ local LAST_ERR=/tmp/tmp.QXOxjWUt3H ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pmm.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5P1pwM8lLj ++ cat /tmp/tmp.QXOxjWUt3H ++ rm /tmp/tmp.5P1pwM8lLj /tmp/tmp.QXOxjWUt3H ++ return 0 + [[ perconalab/pmm-client:dev-latest == perconalab/pmm-client:dev-latest ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.auOuYK4KrF +++ mktemp ++ local LAST_ERR=/tmp/tmp.TPpyKWHBSv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.logcollector.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.auOuYK4KrF ++ cat /tmp/tmp.TPpyKWHBSv ++ rm /tmp/tmp.auOuYK4KrF /tmp/tmp.TPpyKWHBSv ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-logcollector == perconalab/percona-xtradb-cluster-operator:main-logcollector ]] ++ kubectl_bin get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UUYxH2K4Jm +++ mktemp ++ local LAST_ERR=/tmp/tmp.KlULxjbXFd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc upgrade-proxysql -o 'jsonpath={.spec.pxc.image}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UUYxH2K4Jm ++ cat /tmp/tmp.KlULxjbXFd ++ rm /tmp/tmp.UUYxH2K4Jm /tmp/tmp.KlULxjbXFd ++ return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 == perconalab/percona-xtradb-cluster-operator:main-pxc8.0 ]] + : Cluster images have been updated correctly + compare_generation 2 proxysql upgrade-proxysql + local generation=2 + local proxy=proxysql + local cluster=upgrade-proxysql + local current_generation + [[ proxysql == \h\a\p\r\o\x\y ]] + containers=(pxc proxysql) + for container in '"${containers[@]}"' + check_generation 2 pxc upgrade-proxysql + local generation=2 + local container=pxc + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cFWgcHg3PD +++ mktemp ++ local LAST_ERR=/tmp/tmp.9QKpDrYRSR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-pxc -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cFWgcHg3PD ++ cat /tmp/tmp.9QKpDrYRSR ++ rm /tmp/tmp.cFWgcHg3PD /tmp/tmp.9QKpDrYRSR ++ return 0 + current_generation=2 + [[ 2 != \2 ]] + for container in '"${containers[@]}"' + check_generation 2 proxysql upgrade-proxysql + local generation=2 + local container=proxysql + local cluster=upgrade-proxysql + local current_generation ++ kubectl_bin get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ov2QdrP1jW +++ mktemp ++ local LAST_ERR=/tmp/tmp.7OykdhyVQJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset upgrade-proxysql-proxysql -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ov2QdrP1jW ++ cat /tmp/tmp.7OykdhyVQJ ++ rm /tmp/tmp.ov2QdrP1jW /tmp/tmp.7OykdhyVQJ ++ return 0 + current_generation=2 + [[ 2 != \2 ]] + compare_kubectl statefulset/upgrade-proxysql-pxc + local resource=statefulset/upgrade-proxysql-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc.yml + local new_result=/tmp/tmp.PLm7hERkDw/statefulset_upgrade-proxysql-pxc.yml + desc 'compare statefulset/upgrade-proxysql-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/upgrade-proxysql-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-eks.yml ']' + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-80.yml ']' + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + version_gt 1.33 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k129.yml ']' + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k127.yml ']' + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-oc.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc-aks.yml ']' + kubectl_bin get -o yaml statefulset/upgrade-proxysql-pxc + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("upgrade-proxysql-27702", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.MdbuJEGrvD ++ mktemp + local LAST_ERR=/tmp/tmp.tt1ejYXqJ2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/upgrade-proxysql-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.MdbuJEGrvD + cat /tmp/tmp.tt1ejYXqJ2 + rm /tmp/tmp.MdbuJEGrvD /tmp/tmp.tt1ejYXqJ2 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-pxc.yml /tmp/tmp.PLm7hERkDw/statefulset_upgrade-proxysql-pxc.yml + compare_kubectl statefulset/upgrade-proxysql-proxysql + local resource=statefulset/upgrade-proxysql-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql.yml + local new_result=/tmp/tmp.PLm7hERkDw/statefulset_upgrade-proxysql-proxysql.yml + desc 'compare statefulset/upgrade-proxysql-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/upgrade-proxysql-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-eks.yml ']' + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-80.yml ']' + [[ percona/percona-xtradb-cluster:8.0.42-33.1 =~ 8\.4 ]] + version_gt 1.33 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k129.yml ']' + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k127.yml ']' + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-oc.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql-aks.yml ']' + kubectl_bin get -o yaml statefulset/upgrade-proxysql-proxysql ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("upgrade-proxysql-27702", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.yea3k5QO2g ++ mktemp + local LAST_ERR=/tmp/tmp.UysYeD9HJE + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/upgrade-proxysql-proxysql + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.yea3k5QO2g + cat /tmp/tmp.UysYeD9HJE + rm /tmp/tmp.yea3k5QO2g /tmp/tmp.UysYeD9HJE + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2229/e2e-tests/upgrade-proxysql/compare/statefulset_upgrade-proxysql-proxysql.yml /tmp/tmp.PLm7hERkDw/statefulset_upgrade-proxysql-proxysql.yml + desc cleanup + set +o xtrace ----------------------------------------------------------------------------------- cleanup ----------------------------------------------------------------------------------- + destroy upgrade-proxysql-27702 + local namespace=upgrade-proxysql-27702 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v 'the object has been modified' + grep -v 'get backup status: Job.batch' + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + grep -v level=info ++ get_operator_pod + sort -u ++ local label_prefix=app.kubernetes.io/ + tee /tmp/tmp.PLm7hERkDw/operator.log +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.nlnGSuXm9S +++ mktemp ++ local LAST_ERR=/tmp/tmp.x5xPzKVw40 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nlnGSuXm9S ++ cat /tmp/tmp.x5xPzKVw40 ++ rm /tmp/tmp.nlnGSuXm9S /tmp/tmp.x5xPzKVw40 ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-76fc758dcd-4d9d4 ++ mktemp + local LAST_OUT=/tmp/tmp.5cruZQaz0G ++ mktemp + local LAST_ERR=/tmp/tmp.29PoYUJ5qP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-76fc758dcd-4d9d4 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.5cruZQaz0G + cat /tmp/tmp.29PoYUJ5qP + rm /tmp/tmp.5cruZQaz0G /tmp/tmp.29PoYUJ5qP + return 0 2025-11-10T18:39:52.905Z INFO setup Manager starting up {"gitCommit": "77a8e8a8f3140d48a5622cf86bbedd9185b385a7", "gitBranch": "PR-2229-77a8e8a8", "buildTime": "2025-11-10T15:57:32Z", "goVersion": "go1.25.4", "os": "linux", "arch": "amd64"} 2025-11-10T18:39:52.905Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.31.13-gke.1231000"} 2025-11-10T18:39:52.908Z INFO setup Registering Components. 2025-11-10T18:39:53.379Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2025-11-10T18:39:53.380Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2025-11-10T18:39:53.380Z INFO controller-runtime.metrics Starting metrics server 2025-11-10T18:39:53.380Z INFO setup Starting the Cmd. 2025-11-10T18:39:53.380Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2025-11-10T18:39:53.381Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2025-11-10T18:39:53.381Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2025-11-10T18:39:53.381Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2025-11-10T18:39:53.381Z INFO controller-runtime.webhook Starting webhook server 2025-11-10T18:39:53.482Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2025-11-10T18:40:12.437Z DEBUG events percona-xtradb-cluster-operator-76fc758dcd-4d9d4_8af5dd30-f057-4273-8eec-5b906485a669 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"1eb7bc6f-9c1f-4c3c-8f98-bb5762afa4f0","apiVersion":"coordination.k8s.io/v1","resourceVersion":"1762800012431311009"}, "reason": "LeaderElection"} 2025-11-10T18:40:12.437Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2025-11-10T18:40:12.438Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2025-11-10T18:40:12.438Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2025-11-10T18:40:12.438Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.Secret"} 2025-11-10T18:40:12.438Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2025-11-10T18:40:12.539Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2025-11-10T18:40:12.539Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2025-11-10T18:40:12.539Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2025-11-10T18:40:12.539Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2025-11-10T18:40:12.640Z INFO Starting Controller {"controller": "pxc-controller"} 2025-11-10T18:40:12.640Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2025-11-10T18:40:13.050Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:13.202Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:13.225Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:13.298Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:14.385Z INFO Creating or updating backup job {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d", "name": "ac478-daily-backup", "schedule": "0 0 * * *"} 2025-11-10T18:40:14.915Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "543a5f30-f8de-4dd9-b732-cc925e41829d"} 2025-11-10T18:40:21.750Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "4d953f16-37b4-4395-84f5-2fe30871ca37"} 2025-11-10T18:40:28.026Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "f6cb14bd-f719-4b96-80e4-5e5a69f49182"} 2025-11-10T18:40:34.759Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "5c389f8b-f368-4ddb-a67a-1eb594f8a69d"} 2025-11-10T18:40:39.833Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "object": "upgrade-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:39.873Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "object": "upgrade-proxysql-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-10T18:40:40.933Z INFO statefulSet was changed, run smart update {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358"} 2025-11-10T18:40:40.938Z INFO apply changes to secondary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2"} 2025-11-10T18:40:40.938Z INFO primary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0.upgrade-proxysql-pxc.upgrade-proxysql-27702.svc.cluster.local"} 2025-11-10T18:40:41.218Z ERROR sync users {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "69aab0d9-fdca-4b44-9c85-c0e9fded35ec", "error": "exec syncusers: failed to execute command in pod: pod upgrade-proxysql-proxysql-2 does not have a host assigned / / ", "errorVerbose": "exec syncusers: failed to execute command in pod: pod upgrade-proxysql-proxysql-2 does not have a host assigned / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:966\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:867\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693"} 2025-11-10T18:40:41.302Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:40:51.434Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:41:01.468Z INFO Pod is not running {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2", "phase": "Pending"} 2025-11-10T18:41:01.468Z INFO pod is waiting {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2", "reason": "PodInitializing"} 2025-11-10T18:41:31.439Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2"} 2025-11-10T18:42:11.455Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2"} 2025-11-10T18:42:11.459Z INFO apply changes to secondary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1"} 2025-11-10T18:42:11.459Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-2"} 2025-11-10T18:42:11.746Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:42:21.883Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:42:31.852Z INFO Pod is not running {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1", "phase": "Pending"} 2025-11-10T18:42:31.852Z INFO pod is waiting {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1", "reason": "PodInitializing"} 2025-11-10T18:43:11.869Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1"} 2025-11-10T18:43:31.887Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1"} 2025-11-10T18:43:31.890Z INFO apply changes to primary pod {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0"} 2025-11-10T18:43:31.890Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-1"} 2025-11-10T18:43:32.161Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:43:42.273Z INFO Pod is not updated {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0", "currentRevision": "upgrade-proxysql-pxc-d77f48cdf", "targetRevision": "upgrade-proxysql-pxc-858ccd4444"} 2025-11-10T18:43:52.295Z INFO Pod is not running {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0", "phase": "Pending"} 2025-11-10T18:43:52.295Z INFO pod is waiting {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0", "reason": "PodInitializing"} 2025-11-10T18:44:22.290Z INFO Pod is updated, running and ready {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0"} 2025-11-10T18:45:52.302Z INFO pod present in hostgroups {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0"} 2025-11-10T18:45:52.305Z INFO pod is online {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "pod": "upgrade-proxysql-pxc-0"} 2025-11-10T18:45:52.305Z INFO smart update finished {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358"} 2025-11-10T18:45:52.384Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "edc7e863-8e02-415d-8e92-f5ade3f87358", "new version": "8.0.43-34.1"} 2025-11-10T18:45:55.376Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "a2de92c7-770f-4272-a92a-f51199416333"} 2025-11-10T18:46:00.122Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "e231c54e-e5dc-4b8e-9ea4-f01ab0b6d03f"} 2025-11-10T18:46:06.597Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "0f993a3f-1007-47b2-8dcf-2ab9229c955f"} 2025-11-10T18:46:12.849Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "db3170e5-e87c-4c75-a309-1813b6547ac7"} 2025-11-10T18:46:19.345Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "upgrade-proxysql-27702", "name": "upgrade-proxysql", "reconcileID": "8ee96319-5854-4cbb-8613-cc350ace7c53"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:869 + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n upgrade-proxysql-27702 upgrade-proxysql --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/upgrade-proxysql patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.NAmuRjLjl0 ++ mktemp + local LAST_ERR=/tmp/tmp.WJDu15BirD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NAmuRjLjl0 perconaxtradbcluster.pxc.percona.com "upgrade-proxysql" deleted from upgrade-proxysql-27702 namespace + cat /tmp/tmp.WJDu15BirD + rm /tmp/tmp.NAmuRjLjl0 /tmp/tmp.WJDu15BirD + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.3TQLG6k6h2 ++ mktemp + local LAST_ERR=/tmp/tmp.uaSo1eJ0Ow + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.3TQLG6k6h2 No resources found + cat /tmp/tmp.uaSo1eJ0Ow + rm /tmp/tmp.3TQLG6k6h2 /tmp/tmp.uaSo1eJ0Ow + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.UW7ZriuTe6 ++ mktemp + local LAST_ERR=/tmp/tmp.ONQmK4C340 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UW7ZriuTe6 No resources found + cat /tmp/tmp.ONQmK4C340 + rm /tmp/tmp.UW7ZriuTe6 /tmp/tmp.ONQmK4C340 + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.hyWFXNwZ2A ++ mktemp + local LAST_ERR=/tmp/tmp.BVQlMpcrUF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.hyWFXNwZ2A validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.BVQlMpcrUF + rm /tmp/tmp.hyWFXNwZ2A /tmp/tmp.BVQlMpcrUF + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + rm -rf /tmp/tmp.PLm7hERkDw + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator + kubectl_bin delete --grace-period=0 --force=true namespace upgrade-proxysql-27702 ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.ySpZi1WnPY + local LAST_OUT=/tmp/tmp.92TuDHcREt ++ kubectl get crd ++ grep perconaxtradbcluster ++ mktemp ++ tr '\n' ' ' ++ mktemp + local LAST_ERR=/tmp/tmp.zW4X68lv7V + local exit_status=0 ++ awk '{print $1}' + local LAST_ERR=/tmp/tmp.u9N5KTTFr3 + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace upgrade-proxysql-27702 + kubectl delete crd perconaxtradbclusterbackups.pxc.percona.com perconaxtradbclusterrestores.pxc.percona.com perconaxtradbclusters.pxc.percona.com customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusterbackups.pxc.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusterrestores.pxc.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaxtradbclusters.pxc.percona.com" deleted + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed -----------------------------------------------------------------------------------