Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/logs/tls-issue-self-8-0.log Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 + main + create_infra tls-issue-self-25056 + local ns=tls-issue-self-25056 + '[' -n pxc-operator ']' + grep -v NAMESPACE + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-self-2673 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.gT3fncH7W7 ++ mktemp + local LAST_ERR=/tmp/tmp.jTFo95v6b5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.gT3fncH7W7 perconaxtradbcluster.pxc.percona.com "some-name" deleted from tls-issue-self-2673 namespace + cat /tmp/tmp.jTFo95v6b5 + rm /tmp/tmp.gT3fncH7W7 /tmp/tmp.jTFo95v6b5 + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.Rn0A3ygPFU ++ mktemp + local LAST_ERR=/tmp/tmp.ZwyVq9J5Qd + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Rn0A3ygPFU No resources found + cat /tmp/tmp.ZwyVq9J5Qd + rm /tmp/tmp.Rn0A3ygPFU /tmp/tmp.ZwyVq9J5Qd + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.TngDCmTDJH ++ mktemp + local LAST_ERR=/tmp/tmp.jh5qsaEhWc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.TngDCmTDJH No resources found + cat /tmp/tmp.jh5qsaEhWc + rm /tmp/tmp.TngDCmTDJH /tmp/tmp.jh5qsaEhWc + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + xargs kubectl delete ns + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.egm8PNvCV5 + local LAST_OUT=/tmp/tmp.WPcYu0Qjyh ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.KVGFiMZLAZ + local exit_status=0 + local LAST_ERR=/tmp/tmp.37LyYdjDZm + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.egm8PNvCV5 + cat /tmp/tmp.KVGFiMZLAZ + rm /tmp/tmp.egm8PNvCV5 /tmp/tmp.KVGFiMZLAZ + return 0 namespace "tls-issue-self-2673" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WPcYu0Qjyh namespace "pxc-operator" deleted + cat /tmp/tmp.37LyYdjDZm + rm /tmp/tmp.WPcYu0Qjyh /tmp/tmp.37LyYdjDZm + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.9NJu1F0CdU ++ mktemp + local LAST_ERR=/tmp/tmp.TsKRQsqszC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9NJu1F0CdU namespace/pxc-operator created + cat /tmp/tmp.TsKRQsqszC + rm /tmp/tmp.9NJu1F0CdU /tmp/tmp.TsKRQsqszC + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.NmhlfmNALH +++ mktemp ++ local LAST_ERR=/tmp/tmp.d9ptgnX6CA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NmhlfmNALH ++ cat /tmp/tmp.d9ptgnX6CA ++ rm /tmp/tmp.NmhlfmNALH /tmp/tmp.d9ptgnX6CA ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.Ak2t4Obts8 ++ mktemp + local LAST_ERR=/tmp/tmp.pt1LGCc9l7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ak2t4Obts8 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1" modified. + cat /tmp/tmp.pt1LGCc9l7 + rm /tmp/tmp.Ak2t4Obts8 /tmp/tmp.pt1LGCc9l7 + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.ClLr1J0u1X ++ mktemp + local LAST_ERR=/tmp/tmp.19uyyLYhXB + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ClLr1J0u1X customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.19uyyLYhXB + rm /tmp/tmp.ClLr1J0u1X /tmp/tmp.19uyyLYhXB + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/cw-rbac.yaml + kubectl_bin apply -f - + sed -e 's^namespace: .*^namespace: pxc-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.xD2I8hnXYF ++ mktemp + local LAST_ERR=/tmp/tmp.WjSSMxtqQi + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.xD2I8hnXYF clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.WjSSMxtqQi + rm /tmp/tmp.xD2I8hnXYF /tmp/tmp.WjSSMxtqQi + return 0 + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288^' + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/cw-operator.yaml + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "VERBOSE"' - + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - ++ mktemp + local LAST_OUT=/tmp/tmp.nmcglnQndW ++ mktemp + local LAST_ERR=/tmp/tmp.4TC3aVmbLB + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.nmcglnQndW deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.4TC3aVmbLB + rm /tmp/tmp.nmcglnQndW /tmp/tmp.4TC3aVmbLB + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.sfQ9tsOFhI ++ mktemp + local LAST_ERR=/tmp/tmp.p0bvWnQjxA + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.sfQ9tsOFhI pod/percona-xtradb-cluster-operator-7cb9576bf9-22765 condition met + cat /tmp/tmp.p0bvWnQjxA + rm /tmp/tmp.sfQ9tsOFhI /tmp/tmp.p0bvWnQjxA + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.2FmFOPuNkh +++ mktemp ++ local LAST_ERR=/tmp/tmp.uVmmZ4LGCA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2FmFOPuNkh ++ cat /tmp/tmp.uVmmZ4LGCA ++ rm /tmp/tmp.2FmFOPuNkh /tmp/tmp.uVmmZ4LGCA ++ return 0 + wait_pod percona-xtradb-cluster-operator-7cb9576bf9-22765 480 pxc-operator + local pod=percona-xtradb-cluster-operator-7cb9576bf9-22765 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-7cb9576bf9-22765 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-7cb9576bf9-22765 condition met waiting for pod/percona-xtradb-cluster-operator-7cb9576bf9-22765 to become Ready.Ok + sleep 3 + create_namespace tls-issue-self-25056 + local namespace=tls-issue-self-25056 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces tls-issue-self-25056' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces tls-issue-self-25056 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace tls-issue-self-25056 ++ mktemp + xargs kubectl delete ns + kubectl_bin get ns ++ mktemp + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + local LAST_OUT=/tmp/tmp.qvlooYvHEZ ++ mktemp + local LAST_ERR=/tmp/tmp.i2xo73Di3Z + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-self-25056 + awk '{print$1}' + local LAST_OUT=/tmp/tmp.Qo3AmIcxiD ++ mktemp + local LAST_ERR=/tmp/tmp.J8LvRSKlIj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Qo3AmIcxiD + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-self-25056 + cat /tmp/tmp.J8LvRSKlIj + rm /tmp/tmp.Qo3AmIcxiD /tmp/tmp.J8LvRSKlIj + return 0 error: resource(s) were provided, but no name was specified + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-self-25056 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.qvlooYvHEZ + cat /tmp/tmp.i2xo73Di3Z Error from server (NotFound): namespaces "tls-issue-self-25056" not found + rm /tmp/tmp.qvlooYvHEZ /tmp/tmp.i2xo73Di3Z + return 1 + : + wait_for_delete namespace/tls-issue-self-25056 + local res=namespace/tls-issue-self-25056 + echo -n 'waiting for namespace/tls-issue-self-25056 to be deleted' waiting for namespace/tls-issue-self-25056 to be deleted+ set +o xtrace Error from server (NotFound): namespaces "tls-issue-self-25056" not found + desc 'create namespace tls-issue-self-25056' + set +o xtrace ----------------------------------------------------------------------------------- create namespace tls-issue-self-25056 ----------------------------------------------------------------------------------- + kubectl_bin create namespace tls-issue-self-25056 ++ mktemp + local LAST_OUT=/tmp/tmp.ctsL1vXyaU ++ mktemp + local LAST_ERR=/tmp/tmp.X6cmqq3duS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace tls-issue-self-25056 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ctsL1vXyaU namespace/tls-issue-self-25056 created + cat /tmp/tmp.X6cmqq3duS + rm /tmp/tmp.ctsL1vXyaU /tmp/tmp.X6cmqq3duS + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.XD6EAlVBE3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.7TqDOmU47Y ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XD6EAlVBE3 ++ cat /tmp/tmp.7TqDOmU47Y ++ rm /tmp/tmp.XD6EAlVBE3 /tmp/tmp.7TqDOmU47Y ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1 --namespace=tls-issue-self-25056 ++ mktemp + local LAST_OUT=/tmp/tmp.0xq1PvYcZ2 ++ mktemp + local LAST_ERR=/tmp/tmp.wKieqlMJRK + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1 --namespace=tls-issue-self-25056 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0xq1PvYcZ2 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster1" modified. + cat /tmp/tmp.wKieqlMJRK + rm /tmp/tmp.0xq1PvYcZ2 /tmp/tmp.wKieqlMJRK + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.IznXlHpkA5 ++ mktemp + local LAST_ERR=/tmp/tmp.O5YhId9KBF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.IznXlHpkA5 secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.O5YhId9KBF + rm /tmp/tmp.IznXlHpkA5 /tmp/tmp.O5YhId9KBF + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml + : + sleep 10 + desc 'create PXC cluster without cert manager' + set +o xtrace ----------------------------------------------------------------------------------- create PXC cluster without cert manager ----------------------------------------------------------------------------------- + cluster=some-name + spinup_pxc some-name /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml 3 10 /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + local cluster=some-name + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.L7gHQALTlB ++ mktemp + local LAST_ERR=/tmp/tmp.3rTmGlN5rD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L7gHQALTlB secret/my-cluster-secrets created + cat /tmp/tmp.3rTmGlN5rD + rm /tmp/tmp.L7gHQALTlB /tmp/tmp.3rTmGlN5rD + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + kubectl_bin apply -f - + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' ++ mktemp + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.JdherUNoAu + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-self-25056~ + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#apply:.*#apply: Never#' ++ mktemp + local LAST_ERR=/tmp/tmp.Dbv6j5BZM7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.JdherUNoAu deployment.apps/pxc-client created + cat /tmp/tmp.Dbv6j5BZM7 + rm /tmp/tmp.JdherUNoAu /tmp/tmp.Dbv6j5BZM7 + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + '[' -z '' ']' + kubectl_bin apply -f - + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + local LAST_OUT=/tmp/tmp.VEIGj842cc + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' ++ mktemp + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-self-25056~ + local LAST_ERR=/tmp/tmp.zLVAh5RKSD + local exit_status=0 + /usr/bin/sed -e 's#apply:.*#apply: Never#' ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VEIGj842cc perconaxtradbcluster.pxc.percona.com/some-name created + cat /tmp/tmp.zLVAh5RKSD + rm /tmp/tmp.VEIGj842cc /tmp/tmp.zLVAh5RKSD + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name ++ local target_cluster=some-name +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.z0EBgHk0Jc ++++ mktemp +++ local LAST_ERR=/tmp/tmp.gSb3hHd69E +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.z0EBgHk0Jc +++ cat /tmp/tmp.gSb3hHd69E +++ rm /tmp/tmp.z0EBgHk0Jc /tmp/tmp.gSb3hHd69E +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.gYBGJvJfsM ++++ mktemp +++ local LAST_ERR=/tmp/tmp.ibA6oxEUfG +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.gYBGJvJfsM +++ cat /tmp/tmp.ibA6oxEUfG +++ rm /tmp/tmp.gYBGJvJfsM /tmp/tmp.ibA6oxEUfG +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-proxysql ++ return + local proxy=some-name-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-self-25056 ++ mktemp + local LAST_OUT=/tmp/tmp.pafF68Axa3 ++ mktemp + local LAST_ERR=/tmp/tmp.9B7BXwV3kp + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-self-25056 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-self-25056 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-self-25056 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.pafF68Axa3 + cat /tmp/tmp.9B7BXwV3kp error: no matching resources found + rm /tmp/tmp.pafF68Axa3 /tmp/tmp.9B7BXwV3kp + return 1 + true + wait_for_running some-name-proxysql 1 + local name=some-name-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-proxysql-0 480 + local pod=some-name-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-proxysql-0 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=proxysql + set +o xtrace pod/some-name-proxysql-0 condition met waiting for pod/some-name-proxysql-0 to become Ready.Ok + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met waiting for pod/some-name-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met waiting for pod/some-name-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-pxc-2 condition met waiting for pod/some-name-pxc-2 to become Ready.Ok + sleep 10 ++ kubectl get pxc some-name -o 'jsonpath={.spec.secretsName}' + local secret_name=my-cluster-secrets ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.1H8CtSVh6s +++ mktemp ++ local LAST_ERR=/tmp/tmp.P6FSYu2oom ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1H8CtSVh6s ++ cat /tmp/tmp.P6FSYu2oom ++ rm /tmp/tmp.1H8CtSVh6s /tmp/tmp.P6FSYu2oom ++ return 0 + local root_pass=root_password + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1S0MoqaYMm +++ mktemp ++ local LAST_ERR=/tmp/tmp.y5xbVr5FHS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1S0MoqaYMm ++ cat /tmp/tmp.y5xbVr5FHS ++ rm /tmp/tmp.1S0MoqaYMm /tmp/tmp.y5xbVr5FHS ++ return 0 + client_pod=pxc-client-59944c5bbf-769wv + wait_pod pxc-client-59944c5bbf-769wv + local pod=pxc-client-59944c5bbf-769wv + local max_retry=480 + local ns= ++ echo pxc-client-59944c5bbf-769wv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-59944c5bbf-769wv condition met waiting for pod/pxc-client-59944c5bbf-769wv to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Nj9elgzVnD +++ mktemp ++ local LAST_ERR=/tmp/tmp.lKmO8Y6DBl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Nj9elgzVnD ++ cat /tmp/tmp.lKmO8Y6DBl ++ rm /tmp/tmp.Nj9elgzVnD /tmp/tmp.lKmO8Y6DBl ++ return 0 + client_pod=pxc-client-59944c5bbf-769wv + wait_pod pxc-client-59944c5bbf-769wv + local pod=pxc-client-59944c5bbf-769wv + local max_retry=480 + local ns= ++ echo pxc-client-59944c5bbf-769wv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-59944c5bbf-769wv condition met waiting for pod/pxc-client-59944c5bbf-769wv to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Dne7dfRUxh +++ mktemp ++ local LAST_ERR=/tmp/tmp.zDm4RsqwOy ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Dne7dfRUxh ++ cat /tmp/tmp.zDm4RsqwOy ++ rm /tmp/tmp.Dne7dfRUxh /tmp/tmp.zDm4RsqwOy ++ return 0 + client_pod=pxc-client-59944c5bbf-769wv + wait_pod pxc-client-59944c5bbf-769wv + local pod=pxc-client-59944c5bbf-769wv + local max_retry=480 + local ns= ++ echo pxc-client-59944c5bbf-769wv ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-59944c5bbf-769wv condition met waiting for pod/pxc-client-59944c5bbf-769wv to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.vDm9YUq64I/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql /tmp/tmp.vDm9YUq64I/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bMxUMaX5Hm +++ mktemp ++ local LAST_ERR=/tmp/tmp.eo25IkkEZZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bMxUMaX5Hm ++ cat /tmp/tmp.eo25IkkEZZ ++ rm /tmp/tmp.bMxUMaX5Hm /tmp/tmp.eo25IkkEZZ ++ return 0 + client_pod=pxc-client-59944c5bbf-769wv + wait_pod pxc-client-59944c5bbf-769wv + local pod=pxc-client-59944c5bbf-769wv + local max_retry=480 + local ns= ++ echo pxc-client-59944c5bbf-769wv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-59944c5bbf-769wv condition met waiting for pod/pxc-client-59944c5bbf-769wv to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.vDm9YUq64I/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql /tmp/tmp.vDm9YUq64I/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ySi0iuWtX4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.UQArJ1LGNb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ySi0iuWtX4 ++ cat /tmp/tmp.UQArJ1LGNb ++ rm /tmp/tmp.ySi0iuWtX4 /tmp/tmp.UQArJ1LGNb ++ return 0 + client_pod=pxc-client-59944c5bbf-769wv + wait_pod pxc-client-59944c5bbf-769wv + local pod=pxc-client-59944c5bbf-769wv + local max_retry=480 + local ns= ++ echo pxc-client-59944c5bbf-769wv ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-59944c5bbf-769wv condition met waiting for pod/pxc-client-59944c5bbf-769wv to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.vDm9YUq64I/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/select-1.sql /tmp/tmp.vDm9YUq64I/select-1.sql ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ grep -E -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dTPCBOtmkL +++ mktemp ++ local LAST_ERR=/tmp/tmp.4UH3SqxVCC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dTPCBOtmkL ++ cat /tmp/tmp.4UH3SqxVCC Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.dTPCBOtmkL /tmp/tmp.4UH3SqxVCC ++ return 0 + '[' '' ']' + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/some-name to be ready' waiting for pxc/some-name to be ready++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dpmw61bSR7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.0v3Yog1U0o ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dpmw61bSR7 ++ cat /tmp/tmp.0v3Yog1U0o ++ rm /tmp/tmp.dpmw61bSR7 /tmp/tmp.0v3Yog1U0o ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RD9K4hiB8W +++ mktemp ++ local LAST_ERR=/tmp/tmp.WeG6otLCra ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RD9K4hiB8W ++ cat /tmp/tmp.WeG6otLCra ++ rm /tmp/tmp.RD9K4hiB8W /tmp/tmp.WeG6otLCra ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.UJiCOyQskO ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.qcLP4L1RHR +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.UJiCOyQskO +++++ cat /tmp/tmp.qcLP4L1RHR +++++ rm /tmp/tmp.UJiCOyQskO /tmp/tmp.qcLP4L1RHR +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.zyS3qhQxlx ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.mHPbeWeeot +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.zyS3qhQxlx +++++ cat /tmp/tmp.mHPbeWeeot +++++ rm /tmp/tmp.zyS3qhQxlx /tmp/tmp.mHPbeWeeot +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gGwOhwz6IP +++ mktemp ++ local LAST_ERR=/tmp/tmp.QmUdwi9B1A ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gGwOhwz6IP ++ cat /tmp/tmp.QmUdwi9B1A ++ rm /tmp/tmp.gGwOhwz6IP /tmp/tmp.QmUdwi9B1A ++ return 0 + [[ 2 == \2 ]] + echo + desc 'check if certificate issued manually' + set +o xtrace ----------------------------------------------------------------------------------- check if certificate issued manually ----------------------------------------------------------------------------------- + tlsSecretsShouldExist some-name-ssl + local secretName=some-name-ssl + checkTLSSecret some-name-ssl ca.crt + local secretName=some-name-ssl + local dataKey=ca.crt ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["ca.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.z9uPDWQIZd +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ybc3gYMP09 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.z9uPDWQIZd ++ cat /tmp/tmp.Ybc3gYMP09 ++ rm /tmp/tmp.z9uPDWQIZd /tmp/tmp.Ybc3gYMP09 ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-ssl tls.crt + local secretName=some-name-ssl + local dataKey=tls.crt ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["tls.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TP3UYwfhHM +++ mktemp ++ local LAST_ERR=/tmp/tmp.AB91spgPfP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TP3UYwfhHM ++ cat /tmp/tmp.AB91spgPfP ++ rm /tmp/tmp.TP3UYwfhHM /tmp/tmp.AB91spgPfP ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-ssl tls.key + local secretName=some-name-ssl + local dataKey=tls.key ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["tls.key"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YtAzvAb5tw +++ mktemp ++ local LAST_ERR=/tmp/tmp.tPplSvz17f ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YtAzvAb5tw ++ cat /tmp/tmp.tPplSvz17f ++ rm /tmp/tmp.YtAzvAb5tw /tmp/tmp.tPplSvz17f ++ return 0 + local 'secretData="LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcEFJQkFBS0NBUUVBdUR0K2wzR29FZmMwaC82dncxMytZV1NRdmk2czdldDE1a0pCOXN3em80Q2JPYWZICmN0Z3lSNUNFcE9xaGNhdnVkQnBuSzU3YW9GNWlRMkh5WkxNUncrc2ZSVEZ3cDJTMjNsVmYwZDZFa3BRdzMxYUMKRllyRzYvY2xvcDVnSnl4eGF5Si9Ea1gwVlNUb3ZCbElXbHpFY0dLMmdiNTVtZzV3UTVmRzBoZXdDOXlFYlBUbApuYmUzaUZER1c4RWV4cGhYN0hIRnptN0IxQXYydzNzTXJlSmU4NDBtL0NBblRjT1BCOGk0Y1NIZGxZNjNiZGgxCnJWUkEwbjVWcUxZN3JqQ0xIYkRnYTV2S1ZRYTFhUDNvVERtNmR3VlRwQUZIVHZSN0ltaUxySVNWVDBhVTVYS0oKNGNyQ0NUdkl0bHdScHp1bnh1cE44Mm95ckIwUWpGV3JNZkdXendJREFRQUJBb0lCQUJyTVpLeW8xcmJPUzdEZwpoamFYN0pIRUxCM044aytsYVgvMThWeHg5YXo1M3hweTRsczlRWXNSWllvTHF6STZ2VFBjUjFlY0F0ZERBMjRqCnlEdUhwTFRuOWFOOS9wSUszMkxWN2xzN3ovTDJaV21IVHVMTlRnUXk3aUdLZ2hnUXFlclltTHk5eGozQVlhNUMKeXppQnQvMVZEcEV1NE1kZEJFMkF2V1lBRmhhVFhPdkVKM0FPZnVyM3hWb2drWUFWRWt5Smw3YkhWNzhHc2tSRgpJUjVHUkFJQ3FHQ09UZk4ra0F5aWVmVm5VUEZITEdLTk42UWkzNzVBUFlyUmpUL3ZBV3ptaHhObWlTcnMydC94CnMzWThieXpaYS9INjFhSk5rVzNIaVI2VFlsaDhHT3pnakVUdDJpMWtLWTJwcTBPRlBOVkJyUzFxSWJLQTFublQKNWpJNWF4a0NnWUVBMWN5MXNySjM2VTNOUzVFV3ZGZC9zME41bjBleWRIQTh4dnViTk9OWlFQOVFMTlkzRm40Nwp3VmFSME11WGFzQ29HeGRFSGd3bDBaUzd4Mld0MmZmYUt6TDd0NEVTQ25pbFFhWDR2dkZJSnlla2U3cUdYdVN6CjhxUUxjNVBrWldSc1FUR0FuQnErN3hGcHBKZmlnV0hkeU11M0Y0VWVIRE9NOW5GakZEY05CazBDZ1lFQTNKakEKcUM5aFBWYWNmOE1zNThZZGNKbTRHTVJkT1lqbzU2MnVWeVkwaE9EYnlDUFo2QVpUYkdVRDYzMXd0b3FzU3V5TApHVzBTRkhHNUc4N2k1RHlubVVDNCtVZG84Z01NeVdERnY0WmxkM1Jyd0c1SGk5OUcyZUVHeWEzazRjMW9xMkhXCjRnQ3IrcC8vdHNZZWN4b3kzajR2ODUyTlZ4ZDRsQThEcXhjblY0c0NnWUIrN0FvcHpaMDJHWVA0aW1lTzQvcmgKZHZzcXZhdUpTR0FzV0kzcE5kWjBxWnoxSVM2TzRkMmpoenNGVXZmTzNoUnVFTC9WZnF5czRMa2hSSkdTeG5yMApEazQwd0NEdnFuT2dwMkVtS2FNRjY1alFBd2xtS0N0VHJtTkY5OVF0QlJMbkdQWWF0aDRIV3JUMmkxeGlKckU5ClZRS2FxZUlZSjlwVkt6Y0Fkelg2T1FLQmdRQ0hqVG05WHpmaWFDbE1mTk5JTEw0RVpnRHcveURGN1BJcEF0bUIKWmRHWjRVNU1Rbk54RndvR0xtQmxRVFNVaHN2dVVrSDdRc0Y4WEpGQm5EUmh5VCszZFVUMHNNTzFDdGk5bWNDSgp1dno0bFVwcytaYnZSU2tWVXloSG41cG9najhTS05IUkdGYVZiK0hESHlTdzErVndHVWgvNjAxaHVlTjNIMjdDCm9EeWxsd0tCZ1FEUVl0Sjk3eDJmRkZtU3l4YWNsZExqVGg2c0pKSk81emhDUzRnYklTdjczcjkySnk0Tm4wK3gKQ2dmcWwzNTFEb0ozK1NDZWNKK1Q1d255VjVOcDJzYnhPcVpMOWtOY0lZWmM4SlFCWkppbUNJalR2a3pYR1dsZgowWE9QUEhvK0hLOEp0WGpCWmFOMFY2ZWJvSEdpME5oRTBCNEdwcXVONHFVRnJLWVdqRDRRUGc9PQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo="' + '[' -z '"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"' ']' + desc 'check disabling tls' + set +o xtrace ----------------------------------------------------------------------------------- check disabling tls ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge --patch '{"spec": {"tls":{"enabled": false}, "unsafeFlags": {"tls": true}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.uf0EwR0NF8 ++ mktemp + local LAST_ERR=/tmp/tmp.rhQ9K7bBsz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge --patch '{"spec": {"tls":{"enabled": false}, "unsafeFlags": {"tls": true}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.uf0EwR0NF8 perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.rhQ9K7bBsz + rm /tmp/tmp.uf0EwR0NF8 /tmp/tmp.rhQ9K7bBsz + return 0 + sleep 10 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/some-name to be ready' waiting for pxc/some-name to be ready++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yxOPokNt1W +++ mktemp ++ local LAST_ERR=/tmp/tmp.jk7vFjfn6M ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yxOPokNt1W ++ cat /tmp/tmp.jk7vFjfn6M ++ rm /tmp/tmp.yxOPokNt1W /tmp/tmp.jk7vFjfn6M ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 0 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.idTGEreJrS +++ mktemp ++ local LAST_ERR=/tmp/tmp.vYDATBw7Ig ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.idTGEreJrS ++ cat /tmp/tmp.vYDATBw7Ig ++ rm /tmp/tmp.idTGEreJrS /tmp/tmp.vYDATBw7Ig ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 1 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8rghzaOxFh +++ mktemp ++ local LAST_ERR=/tmp/tmp.o2i0l7IDpA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8rghzaOxFh ++ cat /tmp/tmp.o2i0l7IDpA ++ rm /tmp/tmp.8rghzaOxFh /tmp/tmp.o2i0l7IDpA ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 2 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LJ5RWgFzmN +++ mktemp ++ local LAST_ERR=/tmp/tmp.j0SvahP2nt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LJ5RWgFzmN ++ cat /tmp/tmp.j0SvahP2nt ++ rm /tmp/tmp.LJ5RWgFzmN /tmp/tmp.j0SvahP2nt ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 3 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.m2l3Ae3Jxu +++ mktemp ++ local LAST_ERR=/tmp/tmp.Rp6s7lSp5l ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.m2l3Ae3Jxu ++ cat /tmp/tmp.Rp6s7lSp5l ++ rm /tmp/tmp.m2l3Ae3Jxu /tmp/tmp.Rp6s7lSp5l ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 4 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ODu5mGr0gZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.GOcsgv8Q1d ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ODu5mGr0gZ ++ cat /tmp/tmp.GOcsgv8Q1d ++ rm /tmp/tmp.ODu5mGr0gZ /tmp/tmp.GOcsgv8Q1d ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 5 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C4D0F40Fiq +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ivlj35ZpJa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.C4D0F40Fiq ++ cat /tmp/tmp.Ivlj35ZpJa ++ rm /tmp/tmp.C4D0F40Fiq /tmp/tmp.Ivlj35ZpJa ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 6 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.du9D3GVIVr +++ mktemp ++ local LAST_ERR=/tmp/tmp.tkZz6azQLQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.du9D3GVIVr ++ cat /tmp/tmp.tkZz6azQLQ ++ rm /tmp/tmp.du9D3GVIVr /tmp/tmp.tkZz6azQLQ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 7 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4kfLtp5sgN +++ mktemp ++ local LAST_ERR=/tmp/tmp.2Hl7YTo9Kl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4kfLtp5sgN ++ cat /tmp/tmp.2Hl7YTo9Kl ++ rm /tmp/tmp.4kfLtp5sgN /tmp/tmp.2Hl7YTo9Kl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 8 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.x2lZmMQZxs +++ mktemp ++ local LAST_ERR=/tmp/tmp.dAfzrmWNOF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.x2lZmMQZxs ++ cat /tmp/tmp.dAfzrmWNOF ++ rm /tmp/tmp.x2lZmMQZxs /tmp/tmp.dAfzrmWNOF ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 9 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.79m7bYL46q +++ mktemp ++ local LAST_ERR=/tmp/tmp.0DIovHNvAX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.79m7bYL46q ++ cat /tmp/tmp.0DIovHNvAX ++ rm /tmp/tmp.79m7bYL46q /tmp/tmp.0DIovHNvAX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 10 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3RBGWx3bL3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.khw65qpyX1 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3RBGWx3bL3 ++ cat /tmp/tmp.khw65qpyX1 ++ rm /tmp/tmp.3RBGWx3bL3 /tmp/tmp.khw65qpyX1 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 11 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9GgTMiruNY +++ mktemp ++ local LAST_ERR=/tmp/tmp.HGkmJuQ4jk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9GgTMiruNY ++ cat /tmp/tmp.HGkmJuQ4jk ++ rm /tmp/tmp.9GgTMiruNY /tmp/tmp.HGkmJuQ4jk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 12 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7k3hmwrFWO +++ mktemp ++ local LAST_ERR=/tmp/tmp.pSDJ6NSgkX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7k3hmwrFWO ++ cat /tmp/tmp.pSDJ6NSgkX ++ rm /tmp/tmp.7k3hmwrFWO /tmp/tmp.pSDJ6NSgkX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 13 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OB54P4ijiI +++ mktemp ++ local LAST_ERR=/tmp/tmp.sqmEhztuHx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OB54P4ijiI ++ cat /tmp/tmp.sqmEhztuHx ++ rm /tmp/tmp.OB54P4ijiI /tmp/tmp.sqmEhztuHx ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 14 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wdZgsqC9t1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.QzygtKcois ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wdZgsqC9t1 ++ cat /tmp/tmp.QzygtKcois ++ rm /tmp/tmp.wdZgsqC9t1 /tmp/tmp.QzygtKcois ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 15 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zl10xmmYc8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.LoDtzZyWKr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zl10xmmYc8 ++ cat /tmp/tmp.LoDtzZyWKr ++ rm /tmp/tmp.zl10xmmYc8 /tmp/tmp.LoDtzZyWKr ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 16 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kn0Hyz8pp4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.b82l0kv1Ia ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kn0Hyz8pp4 ++ cat /tmp/tmp.b82l0kv1Ia ++ rm /tmp/tmp.kn0Hyz8pp4 /tmp/tmp.b82l0kv1Ia ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 17 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.q6MnRjaq40 +++ mktemp ++ local LAST_ERR=/tmp/tmp.S3urdqZPuV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.q6MnRjaq40 ++ cat /tmp/tmp.S3urdqZPuV ++ rm /tmp/tmp.q6MnRjaq40 /tmp/tmp.S3urdqZPuV ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 18 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gQjIg7rG2F +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZRYyOE6GWx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gQjIg7rG2F ++ cat /tmp/tmp.ZRYyOE6GWx ++ rm /tmp/tmp.gQjIg7rG2F /tmp/tmp.ZRYyOE6GWx ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 19 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7AxpgntF0h +++ mktemp ++ local LAST_ERR=/tmp/tmp.2qTP2VGVt3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7AxpgntF0h ++ cat /tmp/tmp.2qTP2VGVt3 ++ rm /tmp/tmp.7AxpgntF0h /tmp/tmp.2qTP2VGVt3 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 20 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.I4FBVXi7eE +++ mktemp ++ local LAST_ERR=/tmp/tmp.A0bmDqHy6Y ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.I4FBVXi7eE ++ cat /tmp/tmp.A0bmDqHy6Y ++ rm /tmp/tmp.I4FBVXi7eE /tmp/tmp.A0bmDqHy6Y ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 21 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xPgalw33r7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zwYGE7sSP6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xPgalw33r7 ++ cat /tmp/tmp.zwYGE7sSP6 ++ rm /tmp/tmp.xPgalw33r7 /tmp/tmp.zwYGE7sSP6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 22 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vsbEjpkR8b +++ mktemp ++ local LAST_ERR=/tmp/tmp.GvCZIC0jCS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vsbEjpkR8b ++ cat /tmp/tmp.GvCZIC0jCS ++ rm /tmp/tmp.vsbEjpkR8b /tmp/tmp.GvCZIC0jCS ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 23 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Rgz9MlKxZb +++ mktemp ++ local LAST_ERR=/tmp/tmp.m4XNvsJ2Dh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Rgz9MlKxZb ++ cat /tmp/tmp.m4XNvsJ2Dh ++ rm /tmp/tmp.Rgz9MlKxZb /tmp/tmp.m4XNvsJ2Dh ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 24 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PR8kxaPxRc +++ mktemp ++ local LAST_ERR=/tmp/tmp.Or8RTcvGUd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PR8kxaPxRc ++ cat /tmp/tmp.Or8RTcvGUd ++ rm /tmp/tmp.PR8kxaPxRc /tmp/tmp.Or8RTcvGUd ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4sehKzi8ji +++ mktemp ++ local LAST_ERR=/tmp/tmp.vhN9xqbWDL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4sehKzi8ji ++ cat /tmp/tmp.vhN9xqbWDL ++ rm /tmp/tmp.4sehKzi8ji /tmp/tmp.vhN9xqbWDL ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.o9uo6nihm2 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Y0yCIE6ciz +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.o9uo6nihm2 +++++ cat /tmp/tmp.Y0yCIE6ciz +++++ rm /tmp/tmp.o9uo6nihm2 /tmp/tmp.Y0yCIE6ciz +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.kTWZUcI7Sp ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.H7G7z5YQDk +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.kTWZUcI7Sp +++++ cat /tmp/tmp.H7G7z5YQDk +++++ rm /tmp/tmp.kTWZUcI7Sp /tmp/tmp.H7G7z5YQDk +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b4aKGQnvGN +++ mktemp ++ local LAST_ERR=/tmp/tmp.nJFM5IOkYh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.b4aKGQnvGN ++ cat /tmp/tmp.nJFM5IOkYh ++ rm /tmp/tmp.b4aKGQnvGN /tmp/tmp.nJFM5IOkYh ++ return 0 + [[ 2 == \2 ]] + echo + desc 'secrets should be deleted' + set +o xtrace ----------------------------------------------------------------------------------- secrets should be deleted ----------------------------------------------------------------------------------- + kubectl get secret some-name-ssl + kubectl get secret some-name-ssl-internal + compare_kubectl pxc/some-name + local resource=pxc/some-name + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name.yml + local new_result=/tmp/tmp.vDm9YUq64I/pxc_some-name.yml + desc 'compare pxc/some-name-' + set +o xtrace ----------------------------------------------------------------------------------- compare pxc/some-name- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-80.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-aks.yml ']' + kubectl_bin get -o yaml pxc/some-name + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-self-25056", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.c1us8vtpN0 ++ mktemp + local LAST_ERR=/tmp/tmp.BeyrXYSAi9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml pxc/some-name + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.c1us8vtpN0 + cat /tmp/tmp.BeyrXYSAi9 + rm /tmp/tmp.c1us8vtpN0 /tmp/tmp.BeyrXYSAi9 + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name.yml /tmp/tmp.vDm9YUq64I/pxc_some-name.yml + log 'compare_kubectl: pxc/some-name OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T15:06:59+0000]' compare_kubectl: pxc/some-name OK [2025-11-27T15:06:59+0000] compare_kubectl: pxc/some-name OK + desc 'check enabling tls' + set +o xtrace ----------------------------------------------------------------------------------- check enabling tls ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge --patch '{"spec": {"tls":{"enabled": true}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.L7zYmHq6iC ++ mktemp + local LAST_ERR=/tmp/tmp.hTT0r8Psak + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge --patch '{"spec": {"tls":{"enabled": true}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L7zYmHq6iC perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.hTT0r8Psak + rm /tmp/tmp.L7zYmHq6iC /tmp/tmp.hTT0r8Psak + return 0 + sleep 10 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/some-name to be ready' waiting for pxc/some-name to be ready++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3fSahFLgk6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.i1m4cRsRlZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3fSahFLgk6 ++ cat /tmp/tmp.i1m4cRsRlZ ++ rm /tmp/tmp.3fSahFLgk6 /tmp/tmp.i1m4cRsRlZ ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 0 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4GjbAMkP7Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.VHDWL7T0NC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4GjbAMkP7Q ++ cat /tmp/tmp.VHDWL7T0NC ++ rm /tmp/tmp.4GjbAMkP7Q /tmp/tmp.VHDWL7T0NC ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 1 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.amSiFGOhqH +++ mktemp ++ local LAST_ERR=/tmp/tmp.V0FAAKegr3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.amSiFGOhqH ++ cat /tmp/tmp.V0FAAKegr3 ++ rm /tmp/tmp.amSiFGOhqH /tmp/tmp.V0FAAKegr3 ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 2 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9gnbWoHOpc +++ mktemp ++ local LAST_ERR=/tmp/tmp.JHk45wX6ir ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9gnbWoHOpc ++ cat /tmp/tmp.JHk45wX6ir ++ rm /tmp/tmp.9gnbWoHOpc /tmp/tmp.JHk45wX6ir ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 3 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.upvwo2p41L +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZXfCm0rXyC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.upvwo2p41L ++ cat /tmp/tmp.ZXfCm0rXyC ++ rm /tmp/tmp.upvwo2p41L /tmp/tmp.ZXfCm0rXyC ++ return 0 + [[ paused == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 4 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z4sYUQVPEs +++ mktemp ++ local LAST_ERR=/tmp/tmp.lPUAWCFybq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Z4sYUQVPEs ++ cat /tmp/tmp.lPUAWCFybq ++ rm /tmp/tmp.Z4sYUQVPEs /tmp/tmp.lPUAWCFybq ++ return 0 + [[ error == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 5 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yGvatprMdz +++ mktemp ++ local LAST_ERR=/tmp/tmp.wJyHTPoDbM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yGvatprMdz ++ cat /tmp/tmp.wJyHTPoDbM ++ rm /tmp/tmp.yGvatprMdz /tmp/tmp.wJyHTPoDbM ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 6 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XLlCPdFSk9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.aeMKUqksOX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XLlCPdFSk9 ++ cat /tmp/tmp.aeMKUqksOX ++ rm /tmp/tmp.XLlCPdFSk9 /tmp/tmp.aeMKUqksOX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 7 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QdOunwGBow +++ mktemp ++ local LAST_ERR=/tmp/tmp.HAOuZ72SjP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QdOunwGBow ++ cat /tmp/tmp.HAOuZ72SjP ++ rm /tmp/tmp.QdOunwGBow /tmp/tmp.HAOuZ72SjP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 8 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hH0mm0RidR +++ mktemp ++ local LAST_ERR=/tmp/tmp.nBO7mnNVtn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hH0mm0RidR ++ cat /tmp/tmp.nBO7mnNVtn ++ rm /tmp/tmp.hH0mm0RidR /tmp/tmp.nBO7mnNVtn ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 9 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gtsglbNr94 +++ mktemp ++ local LAST_ERR=/tmp/tmp.rEdqS7YNz6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gtsglbNr94 ++ cat /tmp/tmp.rEdqS7YNz6 ++ rm /tmp/tmp.gtsglbNr94 /tmp/tmp.rEdqS7YNz6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 10 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GomAI7Vk5R +++ mktemp ++ local LAST_ERR=/tmp/tmp.nVOIucKfCl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GomAI7Vk5R ++ cat /tmp/tmp.nVOIucKfCl ++ rm /tmp/tmp.GomAI7Vk5R /tmp/tmp.nVOIucKfCl ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 11 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AVzwYf3EzW +++ mktemp ++ local LAST_ERR=/tmp/tmp.8Upcq3qqnC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AVzwYf3EzW ++ cat /tmp/tmp.8Upcq3qqnC ++ rm /tmp/tmp.AVzwYf3EzW /tmp/tmp.8Upcq3qqnC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 12 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.43c7kGBBrv +++ mktemp ++ local LAST_ERR=/tmp/tmp.7LH7so71NB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.43c7kGBBrv ++ cat /tmp/tmp.7LH7so71NB ++ rm /tmp/tmp.43c7kGBBrv /tmp/tmp.7LH7so71NB ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 13 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.t6hn970nnm +++ mktemp ++ local LAST_ERR=/tmp/tmp.S4DZ2c50bJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.t6hn970nnm ++ cat /tmp/tmp.S4DZ2c50bJ ++ rm /tmp/tmp.t6hn970nnm /tmp/tmp.S4DZ2c50bJ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 14 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bK64hITj3c +++ mktemp ++ local LAST_ERR=/tmp/tmp.fU8hrGPHI2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bK64hITj3c ++ cat /tmp/tmp.fU8hrGPHI2 ++ rm /tmp/tmp.bK64hITj3c /tmp/tmp.fU8hrGPHI2 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 15 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.seN7Qn42QK +++ mktemp ++ local LAST_ERR=/tmp/tmp.i67anGYWkd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.seN7Qn42QK ++ cat /tmp/tmp.i67anGYWkd ++ rm /tmp/tmp.seN7Qn42QK /tmp/tmp.i67anGYWkd ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 16 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.581Jgl58Ao +++ mktemp ++ local LAST_ERR=/tmp/tmp.paxDlzZhFL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.581Jgl58Ao ++ cat /tmp/tmp.paxDlzZhFL ++ rm /tmp/tmp.581Jgl58Ao /tmp/tmp.paxDlzZhFL ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 17 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rVwTVGmQqD +++ mktemp ++ local LAST_ERR=/tmp/tmp.qDhNnByzfN ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rVwTVGmQqD ++ cat /tmp/tmp.qDhNnByzfN ++ rm /tmp/tmp.rVwTVGmQqD /tmp/tmp.qDhNnByzfN ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 18 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CpW2kXOTiL +++ mktemp ++ local LAST_ERR=/tmp/tmp.retHKaOzXt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CpW2kXOTiL ++ cat /tmp/tmp.retHKaOzXt ++ rm /tmp/tmp.CpW2kXOTiL /tmp/tmp.retHKaOzXt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 19 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bLYho0zp1o +++ mktemp ++ local LAST_ERR=/tmp/tmp.VSfbflDvfU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bLYho0zp1o ++ cat /tmp/tmp.VSfbflDvfU ++ rm /tmp/tmp.bLYho0zp1o /tmp/tmp.VSfbflDvfU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 20 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CqdAA3daf8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.nr0MxU7MsV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CqdAA3daf8 ++ cat /tmp/tmp.nr0MxU7MsV ++ rm /tmp/tmp.CqdAA3daf8 /tmp/tmp.nr0MxU7MsV ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 21 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d9O7XoDAI3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.SfcT75OMnJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.d9O7XoDAI3 ++ cat /tmp/tmp.SfcT75OMnJ ++ rm /tmp/tmp.d9O7XoDAI3 /tmp/tmp.SfcT75OMnJ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 22 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zQQgAZryqQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.CmoOVHoIBf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zQQgAZryqQ ++ cat /tmp/tmp.CmoOVHoIBf ++ rm /tmp/tmp.zQQgAZryqQ /tmp/tmp.CmoOVHoIBf ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 23 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wpVL5AL31j +++ mktemp ++ local LAST_ERR=/tmp/tmp.iHwitBc6N9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wpVL5AL31j ++ cat /tmp/tmp.iHwitBc6N9 ++ rm /tmp/tmp.wpVL5AL31j /tmp/tmp.iHwitBc6N9 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 24 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QiGdFDhLw3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.C9pAsxMMyz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QiGdFDhLw3 ++ cat /tmp/tmp.C9pAsxMMyz ++ rm /tmp/tmp.QiGdFDhLw3 /tmp/tmp.C9pAsxMMyz ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 25 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0PWWSRUMvr +++ mktemp ++ local LAST_ERR=/tmp/tmp.oUOOKB6Kp4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0PWWSRUMvr ++ cat /tmp/tmp.oUOOKB6Kp4 ++ rm /tmp/tmp.0PWWSRUMvr /tmp/tmp.oUOOKB6Kp4 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo -n . .+ sleep 5 + [[ 26 -ge 300 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oC6U4CDOo6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.miYq4FgyFa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oC6U4CDOo6 ++ cat /tmp/tmp.miYq4FgyFa ++ rm /tmp/tmp.oC6U4CDOo6 /tmp/tmp.miYq4FgyFa ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8gXLU46xKa +++ mktemp ++ local LAST_ERR=/tmp/tmp.Pb6TQKiU43 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8gXLU46xKa ++ cat /tmp/tmp.Pb6TQKiU43 ++ rm /tmp/tmp.8gXLU46xKa /tmp/tmp.Pb6TQKiU43 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.k253vTGaSW ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.UVrG3rOzmt +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.k253vTGaSW +++++ cat /tmp/tmp.UVrG3rOzmt +++++ rm /tmp/tmp.k253vTGaSW /tmp/tmp.UVrG3rOzmt +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.gBg5dkRdNA ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.X8Cf2BkkWP +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.gBg5dkRdNA +++++ cat /tmp/tmp.X8Cf2BkkWP +++++ rm /tmp/tmp.gBg5dkRdNA /tmp/tmp.X8Cf2BkkWP +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SH5aay74TS +++ mktemp ++ local LAST_ERR=/tmp/tmp.TMbuEtqXCz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SH5aay74TS ++ cat /tmp/tmp.TMbuEtqXCz ++ rm /tmp/tmp.SH5aay74TS /tmp/tmp.TMbuEtqXCz ++ return 0 + [[ 2 == \2 ]] + echo + compare_kubectl pxc/some-name -enabled + local resource=pxc/some-name + local postfix=-enabled + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled.yml + local new_result=/tmp/tmp.vDm9YUq64I/pxc_some-name.yml + desc 'compare pxc/some-name--enabled' + set +o xtrace ----------------------------------------------------------------------------------- compare pxc/some-name--enabled ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-80.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled-aks.yml ']' + kubectl_bin get -o yaml pxc/some-name ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-self-25056", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.Ki17EbAMq0 ++ mktemp + local LAST_ERR=/tmp/tmp.ZtFq4voZlI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml pxc/some-name + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ki17EbAMq0 + cat /tmp/tmp.ZtFq4voZlI + rm /tmp/tmp.Ki17EbAMq0 /tmp/tmp.ZtFq4voZlI + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/tls-issue-self/compare/pxc_some-name-enabled.yml /tmp/tmp.vDm9YUq64I/pxc_some-name.yml + log 'compare_kubectl: pxc/some-name OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T15:10:02+0000]' compare_kubectl: pxc/some-name OK [2025-11-27T15:10:02+0000] compare_kubectl: pxc/some-name OK + desc 'secrets should be recreated' + set +o xtrace ----------------------------------------------------------------------------------- secrets should be recreated ----------------------------------------------------------------------------------- + kubectl get secret some-name-ssl + kubectl get secret some-name-ssl-internal + destroy tls-issue-self-25056 + local namespace=tls-issue-self-25056 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info + grep -v 'the object has been modified' + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + sort -u + tee /tmp/tmp.vDm9YUq64I/operator.log + grep -v 'get backup status: Job.batch' ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.MZg7ay5UNk +++ mktemp ++ local LAST_ERR=/tmp/tmp.rMIKHFOLdF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MZg7ay5UNk ++ cat /tmp/tmp.rMIKHFOLdF ++ rm /tmp/tmp.MZg7ay5UNk /tmp/tmp.rMIKHFOLdF ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-7cb9576bf9-22765 ++ mktemp + local LAST_OUT=/tmp/tmp.fCNLXfpG8F ++ mktemp + local LAST_ERR=/tmp/tmp.EsQngm7Hs1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-7cb9576bf9-22765 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.fCNLXfpG8F + cat /tmp/tmp.EsQngm7Hs1 + rm /tmp/tmp.fCNLXfpG8F /tmp/tmp.EsQngm7Hs1 + return 0 2025-11-27T14:57:56.795Z INFO setup Manager starting up {"gitCommit": "54845288ccccfd14bc45dd2658ee1743ac078add", "gitBranch": "PR-2264-54845288", "buildTime": "2025-11-27T12:43:41Z", "goVersion": "go1.25.4", "os": "linux", "arch": "amd64"} 2025-11-27T14:57:56.795Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.31.13-gke.1454000"} 2025-11-27T14:57:56.798Z INFO setup Registering Components. 2025-11-27T14:57:57.155Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2025-11-27T14:57:57.155Z INFO setup Starting the Cmd. 2025-11-27T14:57:57.156Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2025-11-27T14:57:57.156Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2025-11-27T14:57:57.156Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2025-11-27T14:57:57.156Z INFO controller-runtime.metrics Starting metrics server 2025-11-27T14:57:57.156Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2025-11-27T14:57:57.156Z INFO controller-runtime.webhook Starting webhook server 2025-11-27T14:57:57.156Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2025-11-27T14:57:57.257Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2025-11-27T14:57:57.303Z DEBUG events percona-xtradb-cluster-operator-7cb9576bf9-22765_881b1b14-1e99-486d-aa5a-cb0871618a84 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"1f18fe36-16c9-448c-898b-2f610258dbe4","apiVersion":"coordination.k8s.io/v1","resourceVersion":"1764255477290575009"}, "reason": "LeaderElection"} 2025-11-27T14:57:57.303Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.Secret"} 2025-11-27T14:57:57.303Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2025-11-27T14:57:57.304Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2025-11-27T14:57:57.304Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2025-11-27T14:57:57.304Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2025-11-27T14:57:57.405Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2025-11-27T14:57:57.405Z INFO Starting Controller {"controller": "pxc-controller"} 2025-11-27T14:57:57.405Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2025-11-27T14:57:57.405Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2025-11-27T14:57:57.405Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2025-11-27T14:57:57.405Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2025-11-27T14:59:02.719Z INFO Set CR version {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "version": "1.19.0"} 2025-11-27T14:59:04.779Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "auto-some-name-pxc", "kind": "&TypeMeta{Kind:ConfigMap,APIVersion:v1,}"} 2025-11-27T14:59:04.903Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T14:59:04.951Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T14:59:05.036Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T14:59:05.085Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-pxc-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T14:59:05.139Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T14:59:05.281Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c1a2008c-33a8-48a7-9d78-03142ca73fec", "object": "some-name-proxysql-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T14:59:06.133Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "92746ba0-1061-4c19-a0b0-cc3053bdeb13", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2025-11-27T14:59:06.157Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "92746ba0-1061-4c19-a0b0-cc3053bdeb13", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2025-11-27T15:00:17.358Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029", "user": "operator"} 2025-11-27T15:00:17.388Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029", "user": "monitor"} 2025-11-27T15:00:17.434Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029"} 2025-11-27T15:00:17.465Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029"} 2025-11-27T15:00:17.497Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029", "user": "xtrabackup"} 2025-11-27T15:00:17.541Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029"} 2025-11-27T15:00:17.580Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029", "user": "replication"} 2025-11-27T15:00:17.589Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "088a6953-39b6-4740-b6e6-7c08496f7029", "err": "get primary pxc pod: not found"} 2025-11-27T15:00:22.316Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "40e39bc5-b914-469c-a4a4-f79937b9627e", "err": "get primary pxc pod: not found"} 2025-11-27T15:00:27.456Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "1e59977f-26f0-48cf-895b-8e12c6cb94e3", "err": "get primary pxc pod: not found"} 2025-11-27T15:00:32.596Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "317d1674-c46c-404e-82d5-1153b0b1a7ac", "err": "get primary pxc pod: not found"} 2025-11-27T15:02:44.006Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "3c538c3b-10f7-4a82-8516-794532bbbc4d", "user": "root"} 2025-11-27T15:02:44.124Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "3c538c3b-10f7-4a82-8516-794532bbbc4d", "new version": "8.0.43-34.1"} 2025-11-27T15:02:45.896Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "3c538c3b-10f7-4a82-8516-794532bbbc4d"} 2025-11-27T15:02:51.486Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "dea6f642-60bb-4b0d-b820-0d265e37dcf3"} 2025-11-27T15:02:56.778Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "30a04c02-c887-4911-9184-7ebe8ada755f"} 2025-11-27T15:03:02.171Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "3031c478-f126-470f-aaa4-9518d88541bc"} 2025-11-27T15:03:07.475Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "6d2f0ce0-b78b-414f-925f-fd453e0b0b58"} 2025-11-27T15:03:12.771Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "a87e8e41-c020-4ac8-be9d-959a4f6f6ff9"} 2025-11-27T15:03:18.093Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "8bd5cf8a-d0f2-45f3-8bff-0c993f518c19"} 2025-11-27T15:03:23.274Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "e4bfea3f-b8f1-4f1c-a66d-ca352a9313a8"} 2025-11-27T15:03:28.710Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "b3bc0480-0544-4d12-aadc-e7b0aeb47d6e"} 2025-11-27T15:03:33.995Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "fc1d3dd7-60a8-493b-9670-72472f9cb3ba"} 2025-11-27T15:03:39.354Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "6ea3ab63-64b5-4e9e-bf5b-1df97e8efe9c"} 2025-11-27T15:03:44.608Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "3f7b9301-02bb-45b3-8d82-5206c08e5c04"} 2025-11-27T15:03:50.477Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "8b4d8cb0-3a6a-4be4-b181-4b5a2aab0d2b"} 2025-11-27T15:03:55.062Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "c20a3bee-c77d-40ff-a3e4-630014cf84a2"} 2025-11-27T15:04:00.291Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "e982961a-4719-4d31-860c-3afb73c06408"} 2025-11-27T15:04:06.277Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "fcb9e210-80eb-4e3f-921b-a5caff6d65a4"} 2025-11-27T15:04:06.727Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "a6958146-edf8-486d-8694-a98008ef39f1", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:06.814Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "a6958146-edf8-486d-8694-a98008ef39f1", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:06.889Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "a6958146-edf8-486d-8694-a98008ef39f1", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:07.865Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "fcfd80af-a834-481c-b642-51bbdf2ef3f0", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:07.928Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "fcfd80af-a834-481c-b642-51bbdf2ef3f0", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:08.014Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "fcfd80af-a834-481c-b642-51bbdf2ef3f0", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:52.804Z ERROR Reconciler error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "39a87c7e-cbbb-44e9-a3a5-01a632b1dbba", "error": "reconcile users: manage sys users: is old password discarded: select User_attributes field: dial tcp: lookup some-name-pxc-unready.tls-issue-self-25056 on 34.118.224.10:53: no such host", "errorVerbose": "dial tcp: lookup some-name-pxc-unready.tls-issue-self-25056 on 34.118.224.10:53: no such host\nselect User_attributes field\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/pxc/users.(*Manager).IsOldPassDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/pxc/users/users.go:184\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).isOldPasswordDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:1024\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).handleRootUser\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:209\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updateUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:152\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:101\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nis old password discarded\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).isOldPasswordDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:1026\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).handleRootUser\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:209\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updateUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:152\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:101\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nmanage sys users\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:103\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nreconcile users\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:338\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693"} 2025-11-27T15:04:52.905Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "f1f463af-27f1-4b19-9365-e60976d61444", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:52.949Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "f1f463af-27f1-4b19-9365-e60976d61444", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:04:53.011Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "f1f463af-27f1-4b19-9365-e60976d61444", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:05:35.602Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "f195cac9-f920-424d-9986-3d159adfa276", "err": "get primary pxc pod: not found"} 2025-11-27T15:06:55.497Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "aa6292f0-5cae-42ea-bd12-2fc34878b4b8"} 2025-11-27T15:07:00.630Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "4bafc59d-5b0d-47ba-98e6-d99095c88555"} 2025-11-27T15:07:02.174Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "baf12132-bea9-4f51-a15a-48cb482be497", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:02.230Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "baf12132-bea9-4f51-a15a-48cb482be497", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:02.322Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "baf12132-bea9-4f51-a15a-48cb482be497", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:02.871Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "53c7590a-0a8f-4320-b38f-cfae2fb962c6", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:03.023Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "53c7590a-0a8f-4320-b38f-cfae2fb962c6", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:03.117Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "53c7590a-0a8f-4320-b38f-cfae2fb962c6", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:48.007Z ERROR Reconciler error {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "0a08deaa-5430-4215-bfc3-dd5117574ee5", "error": "reconcile users: manage sys users: is old password discarded: select User_attributes field: dial tcp: lookup some-name-pxc-unready.tls-issue-self-25056 on 34.118.224.10:53: no such host", "errorVerbose": "dial tcp: lookup some-name-pxc-unready.tls-issue-self-25056 on 34.118.224.10:53: no such host\nselect User_attributes field\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/pxc/users.(*Manager).IsOldPassDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/pxc/users/users.go:184\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).isOldPasswordDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:1024\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).handleRootUser\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:209\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updateUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:152\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:101\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nis old password discarded\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).isOldPasswordDiscarded\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:1026\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).handleRootUser\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:209\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updateUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:152\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:101\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nmanage sys users\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileUsers\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:103\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:336\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nreconcile users\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:338\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693"} 2025-11-27T15:07:48.114Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "b25a1ace-11fa-49f9-b24b-f0cd8e2bdbe2", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:48.176Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "b25a1ace-11fa-49f9-b24b-f0cd8e2bdbe2", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:07:48.240Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "b25a1ace-11fa-49f9-b24b-f0cd8e2bdbe2", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}", "hashChanged": true, "metaChanged": true} 2025-11-27T15:09:55.425Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "5606960a-04c4-42e5-882c-20211497a3b1"} 2025-11-27T15:10:00.420Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "tls-issue-self-25056", "name": "some-name", "reconcileID": "cb0e936b-026b-430d-8e79-fe3c07a42108"} /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:474 sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1 -  }, -  { -  }, +  }, +  "0a0868660eb6389aedee9f122d3c610a", -  "317ce045912274edda7ce9f4e91ab6e", +  "45577f0050d0838bc675bbf47fdf860", -  Annotations: map[string]string{ +  Annotations: map[string]string{ +  APIVersion: "", -  APIVersion: "apps/v1", -  APIVersion: "apps/v1", -  APIVersion: "v1", +  AvailableReplicas: 0, -  AvailableReplicas: 1, -  AvailableReplicas: 2, -  AvailableReplicas: 3, -  "c2a6edd8ddba4f8d13161c56cbff8800", -  CollisionCount: &0, +  CollisionCount: nil, +  CreationTimestamp: v1.Time{}, -  CreationTimestamp: v1.Time{Time: s"2025-11-27 14:59:04 +0000 UTC"}, +  CurrentReplicas: 0, -  CurrentReplicas: 1, -  CurrentReplicas: 2, -  CurrentReplicas: 3, +  CurrentRevision: "", -  CurrentRevision: "some-name-proxysql-5cd5667878", -  CurrentRevision: "some-name-proxysql-66b44d49d5", -  CurrentRevision: "some-name-proxysql-77f5bbdd", -  CurrentRevision: "some-name-pxc-5d5bbb75d4", -  CurrentRevision: "some-name-pxc-7bd6c585cb", -  CurrentRevision: "some-name-pxc-8487c54dcc", -  DefaultMode: &420, -  DefaultMode: &420, +  DefaultMode: nil, +  DefaultMode: nil, +  DeprecatedServiceAccount: "", -  DeprecatedServiceAccount: "default", +  DNSPolicy: "", -  DNSPolicy: "ClusterFirst", -  FieldsType: "FieldsV1", -  FieldsType: "FieldsV1", -  FieldsV1: s`{"f:metadata":{"f:annotations":{".":{},"f:percona.com/last-confi`..., -  FieldsV1: s`{"f:status":{"f:availableReplicas":{},"f:collisionCount":{},"f:c`..., +  Generation: 0, -  Generation: 1, -  Generation: 2, -  Generation: 3, -  Generation: 4, -  Generation: 5, -  Generation: 6, -  Generation: 7, +  ManagedFields: nil, -  ManagedFields: []v1.ManagedFieldsEntry{ -  Manager: "kube-controller-manager", -  Manager: "percona-xtradb-cluster-operator", -  {Name: "SSL_DIR", Value: "/dev/null"}, +  {Name: "SSL_DIR", Value: "/dev/null"}, +  ObservedGeneration: 0, -  ObservedGeneration: 1, -  ObservedGeneration: 2, -  ObservedGeneration: 3, -  ObservedGeneration: 4, -  ObservedGeneration: 5, -  ObservedGeneration: 6, -  ObservedGeneration: 7, -  Operation: "Update", -  Operation: "Update", -  Optional: &false, +  Optional: &false, -  Optional: &true, +  Optional: &true, -  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6MCwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHhjIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJl"..., +  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6MCwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHhjIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJl"..., -  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6MCwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBw"..., +  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6MCwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBw"..., -  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Miwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBw"..., +  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Miwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBw"..., -  "percona.com/last-config-hash": "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"..., +  "percona.com/last-config-hash": "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"..., -  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Miwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBwLmt1YmVybmV0ZXMuaW8vbmFtZSI6InBlcmNvbmEteHRyYWRiLWNsdXN0ZXIiLCJhcHAua3ViZXJuZXRlcy5pby9wYXJ0LW9mIjoicGVyY29uYS14dHJhZGItY2x1c3RlciJ9fSwidGVtcGxhdGUiOnsibWV0YWRhdGEiOnsibGFiZWxzIjp7ImFwcC5rdWJlcm5ldGVzLmlvL2NvbXBvbmVudCI6InByb3h5c3FsIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJlcm5ldGVzLmlvL25hbWUiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyIiwiYXBwLmt1YmVybmV0ZXMuaW8vcGFydC1vZiI6InBlcmNvbmEteHRyYWRiLWNsdXN0ZXIifSwiYW5ub3RhdGlvbnMiOnsia3ViZWN0bC5rdWJlcm5ldGVzLmlvL2RlZmF1bHQtY29udGFpbmVyIjoicHJveHlzcWwiLCJwZXJjb25hLmNvbS9jb25maWd1cmF0aW9uLWhhc2giOiJkNDFkOGNkOThmMDBiMjA0ZTk4MDA5OThlY2Y4NDI3ZSIsInBlcmNvbmEuY29tL3NzbC1oYXNoIjoiMzE3Y2UwNDU5MTIyNzRlZGRhN2NlOWY0ZTkxYWI2ZWMiLCJwZXJjb25hLmNvbS9zc2wtaW50ZXJuYWwtaGFzaCI6ImMyYTZlZGQ4ZGRiYTRmOGQxMzE2MWM1NmNiZmY4ODAwIn19LCJzcGVjIjp7InZvbHVtZXMiOlt7Im5hbWUiOiJzc2wtaW50ZXJuYWwiLCJzZWNyZXQiOnsic2VjcmV0TmFtZSI6InNvbWUtbmFtZS1zc2wtaW50ZXJuYWwiLCJvcHRpb25hbCI6dHJ1ZX19LHsibmFtZSI6InNzbCIsInNlY3JldCI6eyJzZWNyZXROYW1lIjoic29tZS1uYW1lLXNzbCIsIm9wdGlvbmFsIjpmYWxzZX19LHsibmFtZSI6ImJpbiIsImVtcHR5RGlyIjp7fX1dLCJpbml0Q29udGFpbmVycyI6W3sibmFtZSI6InB4Yy1pbml0IiwiaW1hZ2UiOiJwZXJjb25hbGFiL3BlcmNvbmEteHRyYWRiLWNsdXN0ZXItb3BlcmF0b3I6UFItMjI2NC01NDg0NTI4OCIsImNvbW1hbmQiOlsiL3B4Yy1pbml0LWVudHJ5cG9pbnQuc2giXSwicmVzb3VyY2VzIjp7ImxpbWl0cyI6eyJjcHUiOiI1MG0iLCJtZW1vcnkiOiI1ME0ifX0sInZvbHVtZU1vdW50cyI6W3sibmFtZSI6ImJpbiIsIm1vdW50UGF0aCI6Ii92YXIvbGliL215c3FsIn1dLCJpbWFnZVB1bGxQb2xpY3kiOiJBbHdheXMifSx7Im5hbWUiOiJwcm94eXNxbC1pbml0IiwiaW1hZ2UiOiJwZXJjb25hbGFiL3BlcmNvbmEteHRyYWRiLWNsdXN0ZXItb3BlcmF0b3I6UFItMjI2NC01NDg0NTI4OCIsImNvbW1hbmQiOlsiL3Byb3h5c3FsLWluaXQtZW50cnlwb2ludC5zaCJdLCJyZXNvdXJjZXMiOnsibGltaXRzIjp7ImNwdSI6IjUwbSIsIm1lbW9yeSI6IjUwTSJ9fSwidm9sdW1lTW91bnRzIjpbeyJuYW1lIjoiYmluIiwibW91bnRQYXRoIjoiL29wdC9wZXJjb25hIn1dLCJpbWFnZVB1bGxQb2xpY3kiOiJBbHdheXMifV0sImNvbnRhaW5lcnMiOlt7Im5hbWUiOiJwcm94eXNxbCIsImltYWdlIjoicGVyY29uYWxhYi9wZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yOm1haW4tcHJveHlzcWwiLCJjb21tYW5kIjpbIi9vcHQvcGVyY29uYS9wcm94eXNxbC1lbnRyeXBvaW50LnNoIl0sImFyZ3MiOlsicHJveHlzcWwiLCItZiIsIi1jIiwiL2V0Yy9wcm94eXNxbC9wcm94eXNxbC5jbmYiLCItLXJlbG9hZCJdLCJwb3J0cyI6W3sibmFtZSI6Im15c3FsIiwiY29udGFpbmVyUG9ydCI6MzMwNn0seyJuYW1lIjoicHJveHlhZG0iLCJjb250YWluZXJQb3J0Ijo2MDMyfSx7Im5hbWUiOiJzdGF0cyIsImNvbnRhaW5lclBvcnQiOjYwNzB9XSwiZW52RnJvbSI6W3sic2VjcmV0UmVmIjp7Im5hbWUiOiJzb21lLW5hbWUtZW52LXZhcnMtcHJveHlzcWwiLCJvcHRpb25hbCI6dHJ1ZX19XSwiZW52IjpbeyJuYW1lIjoiUFhDX1NFUlZJQ0UiLCJ2YWx1ZSI6InNvbWUtbmFtZS1weGMifSx7Im5hbWUiOiJPUEVSQVRPUl9QQVNTV09SRCIsInZhbHVlRnJvbSI6eyJzZWNyZXRLZXlSZWYiOnsibmFtZSI6ImludGVybmFsLXNvbWUtbmFtZSIsImtleSI6Im9wZXJhdG9yIn19fSx7Im5hbWUiOiJQUk9YWV9BRE1JTl9VU0VSIiwidmFsdWUiOiJwcm94eWFkbWluIn0seyJuYW1lIjoiUFJPWFlfQURNSU5fUEFTU1dPUkQiLCJ2YWx1ZUZyb20iOnsic2VjcmV0S2V5UmVmIjp7Im5hbWUiOiJpbnRlcm5hbC1zb21lLW5hbWUiLCJrZXkiOiJwcm94eWFkbWluIn19fSx7Im5hbWUiOiJNT05JVE9SX1BBU1NXT1JEIiwidmFsdWVGcm9tIjp7InNlY3JldEtleVJlZiI6eyJuYW1lIjoiaW50ZXJuYWwtc29tZS1uYW1lIiwia2V5IjoibW9uaXRvciJ9fX0seyJuYW1lIjoiU0NIRURVTEVSX0NIRUNLVElNRU9VVCIsInZhbHVlIjoiMCJ9LHsibmFtZSI6IlNDSEVEVUxFUl9XUklURVJBTFNPUkVBREVSIiwidmFsdWUiOiIwIn0seyJuYW1lIjoiU0NIRURVTEVSX1JFVFJZVVAiLCJ2YWx1ZSI6IjAifSx7Im5hbWUiOiJTQ0hFRFVMRVJfUkVUUllET1dOIiwidmFsdWUiOiIwIn0seyJuYW1lIjoiU0NIRURVTEVSX1BJTkdUSU1FT1VUIiwidmFsdWUiOiIwIn0seyJuYW1lIjoiU0NIRURVTEVSX05PREVDSEVDS0lOVEVSVkFMIiwidmFsdWUiOiIwIn0seyJuYW1lIjoiU0NIRURVTEVSX01BWENPTk5FQ1RJT05TIiwidmFsdWUiOiIwIn1dLCJyZXNvdXJjZXMiOnsibGltaXRzIjp7ImNwdSI6IjcwMG0iLCJtZW1vcnkiOiIxRyJ9LCJyZXF1ZXN0cyI6eyJjcHUiOiIxMDBtIiwibWVtb3J5IjoiMTAwTSJ9fSwidm9sdW1lTW91bnRzIjpbeyJuYW1lIjoicHJveHlkYXRhIiwibW91bnRQYXRoIjoiL3Zhci9saWIvcHJveHlzcWwifSx7Im5hbWUiOiJzc2wiLCJtb3VudFBhdGgiOiIvZXRjL3Byb3h5c3FsL3NzbCJ9LHsibmFtZSI6InNzbC1pbnRlcm5hbCIsIm1vdW50UGF0aCI6Ii9ldGMvcHJveHlzcWwvc3NsLWludGVybmFsIn0seyJuYW1lIjoi"..., +  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Miwic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHJveHlzcWwiLCJhcHAua3ViZXJuZXRlcy5pby9pbnN0YW5jZSI6InNvbWUtbmFtZSIsImFwcC5rdWJlcm5ldGVzLmlvL21hbmFnZWQtYnkiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyLW9wZXJhdG9yIiwiYXBwLmt1YmVybmV0ZXMuaW8vbmFtZSI6InBlcmNvbmEteHRyYWRiLWNsdXN0ZXIiLCJhcHAua3ViZXJuZXRlcy5pby9wYXJ0LW9mIjoicGVyY29uYS14dHJhZGItY2x1c3RlciJ9fSwidGVtcGxhdGUiOnsibWV0YWRhdGEiOnsibGFiZWxzIjp7ImFwcC5rdWJlcm5ldGVzLmlvL2NvbXBvbmVudCI6InByb3h5c3FsIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJlcm5ldGVzLmlvL25hbWUiOiJwZXJjb25hLXh0cmFkYi1jbHVzdGVyIiwiYXBwLmt1YmVybmV0ZXMuaW8vcGFydC1vZiI6InBlcmNvbmEteHRyYWRiLWNsdXN0ZXIifSwiYW5ub3RhdGlvbnMiOnsia3ViZWN0bC5rdWJlcm5ldGVzLmlvL2RlZmF1bHQtY29udGFpbmVyIjoicHJveHlzcWwiLCJwZXJjb25hLmNvbS9jb25maWd1cmF0aW9uLWhhc2giOiJkNDFkOGNkOThmMDBiMjA0ZTk4MDA5OThlY2Y4NDI3ZSIsInBlcmNvbmEuY29tL3NzbC1oYXNoIjoiNDU1NzdmMDA1MGQwODM4YmM2NzViYmY0N2ZkZjg2"..., -  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Mywic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHhjIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJl"..., +  "percona.com/last-config-hash": "eyJyZXBsaWNhcyI6Mywic2VsZWN0b3IiOnsibWF0Y2hMYWJlbHMiOnsiYXBwLmt1YmVybmV0ZXMuaW8vY29tcG9uZW50IjoicHhjIiwiYXBwLmt1YmVybmV0ZXMuaW8vaW5zdGFuY2UiOiJzb21lLW5hbWUiLCJhcHAua3ViZXJuZXRlcy5pby9tYW5hZ2VkLWJ5IjoicGVyY29uYS14dHJhZGItY2x1c3Rlci1vcGVyYXRvciIsImFwcC5rdWJl"..., -  "percona.com/last-config-hash": "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"..., +  "percona.com/last-config-hash": "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"..., -  "percona.com/last-config-hash": "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"..., +  "percona.com/last-config-hash": "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"..., +  "percona.com/last-config-hash": "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"..., -  "percona.com/last-config-hash": "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"..., +  PeriodSeconds: 0, -  PeriodSeconds: 10, +  PersistentVolumeClaimRetentionPolicy: nil, -  PersistentVolumeClaimRetentionPolicy: s"&StatefulSetPersistentVolumeClaimRetentionPolicy{WhenDeleted:Retain,WhenScaled:Retain,}", +  Phase: "", -  Phase: "Pending", +  PodManagementPolicy: "", -  PodManagementPolicy: "OrderedReady", +  Protocol: "", -  Protocol: "TCP", +  ReadyReplicas: 0, -  ReadyReplicas: 1, -  ReadyReplicas: 2, -  ReadyReplicas: 3, -  Replicas: &0, +  Replicas: 0, +  Replicas: &0, -  Replicas: 2, -  Replicas: &2, +  Replicas: &2, -  Replicas: 3, -  Replicas: &3, +  Replicas: &3, +  ResourceVersion: "", -  ResourceVersion: "1764255577923775023", -  ResourceVersion: "1764255762277071023", -  ResourceVersion: "1764255846995791023", -  ResourceVersion: "1764255847497247023", -  ResourceVersion: "1764255848986831023", -  ResourceVersion: "1764255890633903023", -  ResourceVersion: "1764255923820703023", -  ResourceVersion: "1764256011600687023", -  ResourceVersion: "1764256022221327023", -  ResourceVersion: "1764256022686895023", -  ResourceVersion: "1764256022918831023", -  ResourceVersion: "1764256025606751023", -  ResourceVersion: "1764256061840143023", +  RestartPolicy: "", -  RestartPolicy: "Always", -  RevisionHistoryLimit: &10, +  RevisionHistoryLimit: nil, +  SchedulerName: "", -  SchedulerName: "default-scheduler", -  Subresource: "status", +  TerminationMessagePath: "", -  TerminationMessagePath: "/dev/termination-log", +  TerminationMessagePolicy: "", -  TerminationMessagePolicy: "File", -  Time: s"2025-11-27 14:59:04 +0000 UTC", -  Time: s"2025-11-27 14:59:37 +0000 UTC", -  Time: s"2025-11-27 15:02:42 +0000 UTC", -  Time: s"2025-11-27 15:04:06 +0000 UTC", -  Time: s"2025-11-27 15:04:06 +0000 UTC", -  Time: s"2025-11-27 15:04:07 +0000 UTC", -  Time: s"2025-11-27 15:04:07 +0000 UTC", -  Time: s"2025-11-27 15:04:08 +0000 UTC", -  Time: s"2025-11-27 15:04:50 +0000 UTC", -  Time: s"2025-11-27 15:04:52 +0000 UTC", -  Time: s"2025-11-27 15:05:23 +0000 UTC", -  Time: s"2025-11-27 15:06:51 +0000 UTC", -  Time: s"2025-11-27 15:07:02 +0000 UTC", -  Time: s"2025-11-27 15:07:02 +0000 UTC", -  Time: s"2025-11-27 15:07:03 +0000 UTC", -  Time: s"2025-11-27 15:07:05 +0000 UTC", -  Time: s"2025-11-27 15:07:41 +0000 UTC", -  TopologySpreadConstraints: nil, +  TopologySpreadConstraints: []v1.TopologySpreadConstraint{}, +  UID: "", -  UID: "0170e8f0-62c5-4e86-b378-e54bc1806422", -  UID: "6c2befb5-99c5-41e2-bd64-bca2c84cf09b", +  UpdatedReplicas: 0, -  UpdatedReplicas: 2, -  UpdatedReplicas: 3, +  UpdateRevision: "", -  UpdateRevision: "some-name-proxysql-5cd5667878", -  UpdateRevision: "some-name-proxysql-66b44d49d5", -  UpdateRevision: "some-name-proxysql-77f5bbdd", -  UpdateRevision: "some-name-pxc-5d5bbb75d4", -  UpdateRevision: "some-name-pxc-7bd6c585cb", -  UpdateRevision: "some-name-pxc-8487c54dcc", -  VolumeMode: &"Filesystem", +  VolumeMode: nil,   }    },    },    {    },    },    {    },    }, ""),    },    {    },    },    },    ... // 16 identical fields    ... // 16 identical fields    ... // 22 identical fields    ... // 2 identical fields    ... // 2 identical fields    ... // 3 identical elements    ... // 3 identical fields    ... // 3 identical fields    ... // 3 identical fields    ... // 4 identical fields    ... // 5 identical fields    ... // 5 identical fields    ... // 5 identical fields    ... // 6 identical fields    ... // 6 identical fields    ... // 7 identical fields    ... // 8 identical fields    ... // 9 identical fields    ... // 9 identical fields    AccessModes: nil,    ActiveDeadlineSeconds: nil,    Affinity: &{PodAntiAffinity: &{RequiredDuringSchedulingIgnoredDuringExecution: {{LabelSelector: &{MatchLabels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}}, TopologyKey: "kubernetes.io/hostname"}}}},    Affinity: &{PodAntiAffinity: &{RequiredDuringSchedulingIgnoredDuringExecution: {{LabelSelector: &{MatchLabels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}}, TopologyKey: "kubernetes.io/hostname"}}}},    Annotations: map[string]string{    Args: {"mysqld"},    Args: {"proxysql", "-f", "-c", "/etc/proxysql/proxysql.cnf", ...},    AutomountServiceAccountToken: nil,    AvailableReplicas: 0,    AWSElasticBlockStore: nil,    AzureFile: nil,    "c",    Capacity: nil,    Conditions: nil,    ConfigMapKeyRef: nil,    ConfigMap: &v1.ConfigMapVolumeSource{    ContainerPort: 3306,    ContainerPort: 33060,    ContainerPort: 33062,    ContainerPort: 4444,    ContainerPort: 4567,    ContainerPort: 4568,    ContainerPort: 6032,    ContainerPort: 6070,    Containers: []v1.Container{    CurrentReplicas: 0,    DataSource: nil,    DataSourceRef: nil,    DeletionGracePeriodSeconds: nil,    DeletionGracePeriodSeconds: nil,    DeletionTimestamp: nil,    EnvFrom: {{SecretRef: &{LocalObjectReference: {Name: "some-name-env-vars-proxysql"}, Optional: &true}}},    EnvFrom: {{SecretRef: &{LocalObjectReference: {Name: "some-name-env-vars-pxc"}, Optional: &true}}},    EnvFrom: {{SecretRef: &{LocalObjectReference: {Name: "some-name-log-collector"}, Optional: &true}}},    Env: {{Name: "PXC_SERVICE", Value: "some-name-pxc"}, {Name: "OPERATOR_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "operator"}}}, {Name: "PROXY_ADMIN_USER", Value: "proxyadmin"}, {Name: "PROXY_ADMIN_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "proxyadmin"}}}, ...},    Env: {{Name: "PXC_SERVICE", Value: "some-name-pxc-unready"}, {Name: "MONITOR_HOST", Value: "%"}, {Name: "MYSQL_ROOT_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "root"}}}, {Name: "XTRABACKUP_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "xtrabackup"}}}, ...},    Env: []v1.EnvVar{    EphemeralContainers: nil,    FailureThreshold: 3,    FC: nil,    FieldPath: "metadata.name",    FieldPath: "metadata.namespace",    FieldRef: &v1.ObjectFieldSelector{    Finalizers: nil,    Finalizers: nil,    GitRepo: nil,    HostAliases: nil,    HostIP: "",    HostPort: 0,    ImagePullPolicy: "Always",    InitContainers: []v1.Container{    InitialDelaySeconds: 300,    ISCSI: nil,    Items: nil,    Items: nil,    "kubectl.kubernetes.io/default-container": "proxysql",    "kubectl.kubernetes.io/default-container": "pxc",    Labels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...},    Labels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...},    Labels: nil,    Lifecycle: nil,    LivenessProbe: &v1.Probe{    LocalObjectReference: {Name: "auto-some-name-pxc"},    LocalObjectReference: {Name: "some-name-pxc"},    ManagedFields: nil,    MinReadySeconds: 0,    Name: "auto-config",    {Name: "bin", VolumeSource: {EmptyDir: &{}}},    Name: "config",    Name: "ist",    {Name: "LOG_DATA_DIR", Value: "/var/lib/mysql"},    {Name: "MONITOR_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "monitor"}}},    Name: "mysql",    Name: "mysql-admin",    Name: "mysql-init-file",    Name: "mysql-users-secret-file",    Name: "mysqlx",    Name: "POD_NAME",    Name: "POD_NAMESPASE",    Name: "proxyadm",    {Name: "PROXY_ADMIN_PASSWORD", ValueFrom: &{SecretKeyRef: &{LocalObjectReference: {Name: "internal-some-name"}, Key: "proxyadmin"}}},    Namespace: "tls-issue-self-25056",    Name: "ssl",    Name: "ssl-internal",    Name: "sst",    Name: "stats",    {Name: "tmp", VolumeSource: {EmptyDir: &{}}},    Name: "vault-keyring-secret",    Name: "write-set",    NFS: nil,    NodeName: "",    NodeSelector: nil,    ObjectMeta: {Labels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}, Annotations: {"kubectl.kubernetes.io/default-container": "proxysql", "percona.com/configuration-hash": "d41d8cd98f00b204e9800998ecf8427e", "percona.com/ssl-hash": "317ce045912274edda7ce9f4e91ab6ec", "percona.com/ssl-internal-hash": "c2a6edd8ddba4f8d13161c56cbff8800"}},    ObjectMeta: {Labels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}, Annotations: {"kubectl.kubernetes.io/default-container": "proxysql", "percona.com/configuration-hash": "d41d8cd98f00b204e9800998ecf8427e", "percona.com/ssl-hash": "45577f0050d0838bc675bbf47fdf860c", "percona.com/ssl-internal-hash": "0a0868660eb6389aedee9f122d3c610a"}},    ObjectMeta: {Labels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}, Annotations: {"kubectl.kubernetes.io/default-container": "pxc", "percona.com/configuration-hash": "d41d8cd98f00b204e9800998ecf8427e", "percona.com/ssl-hash": "317ce045912274edda7ce9f4e91ab6ec", "percona.com/ssl-internal-hash": "c2a6edd8ddba4f8d13161c56cbff8800"}},    ObjectMeta: {Labels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}, Annotations: {"kubectl.kubernetes.io/default-container": "pxc", "percona.com/configuration-hash": "d41d8cd98f00b204e9800998ecf8427e", "percona.com/ssl-hash": "45577f0050d0838bc675bbf47fdf860c", "percona.com/ssl-internal-hash": "0a0868660eb6389aedee9f122d3c610a"}},    ObjectMeta: {Name: "datadir", Labels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}},    ObjectMeta: {Name: "proxydata", Labels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}},    ObjectMeta: v1.ObjectMeta{    ObjectMeta: v1.ObjectMeta{    Optional: &false,    Optional: &true,    Optional: &true,    Ordinals: nil,    OS: nil,    Overhead: nil,    OwnerReferences: {{APIVersion: "pxc.percona.com/v1", Kind: "PerconaXtraDBCluster", Name: "some-name", UID: "f57f5c5b-2920-4198-a39b-4815994c4b07", ...}},    OwnerReferences: nil,    "percona.com/configuration-hash": "d41d8cd98f00b204e9800998ecf8427e",    "percona.com/ssl-hash": "45577f0050d0838bc675bbf47fdf860c",    "percona.com/ssl-hash": strings.Join({    "percona.com/ssl-internal-hash": "c2a6edd8ddba4f8d13161c56cbff8800",    "percona.com/ssl-internal-hash": strings.Join({    Ports: nil,    Ports: []v1.ContainerPort{    PreemptionPolicy: nil,    ProbeHandler: {Exec: &{Command: {"/var/lib/mysql/liveness-check.sh"}}},    Quobyte: nil,    ReadinessProbe: &{ProbeHandler: {Exec: &{Command: {"/var/lib/mysql/readiness-check.sh"}}}, InitialDelaySeconds: 15, TimeoutSeconds: 15, PeriodSeconds: 30, ...},    ReadyReplicas: 0,    Replicas: 0,    Replicas: &2,    Replicas: &3,    ResizePolicy: nil,    ResourceFieldRef: nil,    Resources: {},    SecretName: "internal-some-name",    SecretName: "some-name-mysql-init",    SecretName: "some-name-ssl",    SecretName: "some-name-ssl-internal",    SecretName: "some-name-vault",    Secret: &v1.SecretVolumeSource{    SecurityContext: nil,    Selector: &{MatchLabels: {"app.kubernetes.io/component": "proxysql", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}},    Selector: &{MatchLabels: {"app.kubernetes.io/component": "pxc", "app.kubernetes.io/instance": "some-name", "app.kubernetes.io/managed-by": "percona-xtradb-cluster-operator", "app.kubernetes.io/name": "percona-xtradb-cluster", ...}},    SelfLink: "",    ServiceAccountName: "default",    ServiceName: "some-name-proxysql-unready",    ServiceName: "some-name-pxc",    SetHostnameAsFQDN: nil,    Spec: v1.PersistentVolumeClaimSpec{    Spec: v1.PodSpec{    Spec: v1.StatefulSetSpec{    StartupProbe: nil,    Status: v1.PersistentVolumeClaimStatus{    Status: v1.StatefulSetStatus{    StorageClassName: nil,    Subdomain: "",    SuccessThreshold: 1,    Template: v1.PodTemplateSpec{    TerminationGracePeriodSeconds: &30,    TerminationGracePeriodSeconds: &600,    TerminationGracePeriodSeconds: nil,    TimeoutSeconds: 5,    Tolerations: nil,    TypeMeta: {},    TypeMeta: {Kind: "StatefulSet", APIVersion: "apps/v1"},    UpdatedReplicas: 0,    UpdateStrategy: {Type: "RollingUpdate", RollingUpdate: &{Partition: &0}},   &v1.StatefulSet{    Value: "",    ValueFrom: &v1.EnvVarSource{    VolumeAttributesClassName: nil,    VolumeClaimTemplates: []v1.PersistentVolumeClaim{    VolumeDevices: nil,    VolumeMounts: {{Name: "datadir", MountPath: "/var/lib/mysql"}, {Name: "config", MountPath: "/etc/percona-xtradb-cluster.conf.d"}, {Name: "tmp", MountPath: "/tmp"}, {Name: "ssl", MountPath: "/etc/mysql/ssl"}, ...},    VolumeName: "",    VolumeSource: v1.VolumeSource{    Volumes: []v1.Volume{    VsphereVolume: nil,    WorkingDir: "", + grep -v NAMESPACE + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-self-25056 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.thNYpfUchZ ++ mktemp + local LAST_ERR=/tmp/tmp.cyUR1t4DXV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.thNYpfUchZ perconaxtradbcluster.pxc.percona.com "some-name" deleted from tls-issue-self-25056 namespace + cat /tmp/tmp.cyUR1t4DXV + rm /tmp/tmp.thNYpfUchZ /tmp/tmp.cyUR1t4DXV + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.jHD3odATWg ++ mktemp + local LAST_ERR=/tmp/tmp.K2Siqdh3n2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.jHD3odATWg No resources found + cat /tmp/tmp.K2Siqdh3n2 + rm /tmp/tmp.jHD3odATWg /tmp/tmp.K2Siqdh3n2 + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.4WWhbgpSjv ++ mktemp + local LAST_ERR=/tmp/tmp.qGaER5zRV4 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4WWhbgpSjv No resources found + cat /tmp/tmp.qGaER5zRV4 + rm /tmp/tmp.4WWhbgpSjv /tmp/tmp.qGaER5zRV4 + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.DRgtohDYfr ++ mktemp + local LAST_ERR=/tmp/tmp.FSVXSxgtu7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DRgtohDYfr validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.FSVXSxgtu7 + rm /tmp/tmp.DRgtohDYfr /tmp/tmp.FSVXSxgtu7 + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + rm -rf /tmp/tmp.vDm9YUq64I + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator + kubectl_bin delete --grace-period=0 --force=true namespace tls-issue-self-25056 ++ mktemp ++ mktemp + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.yzThsQuwF5 + local LAST_OUT=/tmp/tmp.GSGgbKl6Ii ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.MwCIt8IwkM + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.UpiQK4xoOL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace tls-issue-self-25056 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator