Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/logs/tls-issue-cert-manager-ref-8-0.log Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 + main + create_infra tls-issue-cert-manager-ref-23205 + local ns=tls-issue-cert-manager-ref-23205 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch pxc -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: resource(s) were provided, but no name was specified + : + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.UiCGh1ZWMA ++ mktemp + local LAST_ERR=/tmp/tmp.w8Y6uruXvp + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UiCGh1ZWMA No resources found + cat /tmp/tmp.w8Y6uruXvp + rm /tmp/tmp.UiCGh1ZWMA /tmp/tmp.w8Y6uruXvp + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.salxZOfMdj ++ mktemp + local LAST_ERR=/tmp/tmp.QTSsjSBHW6 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.salxZOfMdj No resources found + cat /tmp/tmp.QTSsjSBHW6 + rm /tmp/tmp.salxZOfMdj /tmp/tmp.QTSsjSBHW6 + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.Ky8YBwgdF1 ++ mktemp + local LAST_ERR=/tmp/tmp.v8H888IWes + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ky8YBwgdF1 No resources found + cat /tmp/tmp.v8H888IWes + rm /tmp/tmp.Ky8YBwgdF1 /tmp/tmp.v8H888IWes + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- ++ mktemp + kubectl_bin delete namespace pxc-operator + xargs kubectl delete ns + local LAST_OUT=/tmp/tmp.pjuzuLusys ++ mktemp + awk '{print$1}' + local LAST_OUT=/tmp/tmp.uQp7vjZjuY ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.N9SE5HkAdT + local exit_status=0 + local LAST_ERR=/tmp/tmp.mlWFVg3wL4 + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.pjuzuLusys + cat /tmp/tmp.N9SE5HkAdT + rm /tmp/tmp.pjuzuLusys /tmp/tmp.N9SE5HkAdT + return 0 namespace "cert-manager" deleted namespace "tls-issue-cert-manager-ref-18908" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.uQp7vjZjuY namespace "pxc-operator" deleted + cat /tmp/tmp.mlWFVg3wL4 + rm /tmp/tmp.uQp7vjZjuY /tmp/tmp.mlWFVg3wL4 + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.CdkRqO7vA2 ++ mktemp + local LAST_ERR=/tmp/tmp.iAJ1ivgnUw + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CdkRqO7vA2 namespace/pxc-operator created + cat /tmp/tmp.iAJ1ivgnUw + rm /tmp/tmp.CdkRqO7vA2 /tmp/tmp.iAJ1ivgnUw + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.GQq7mLNnNB +++ mktemp ++ local LAST_ERR=/tmp/tmp.4Sl19clYQj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GQq7mLNnNB ++ cat /tmp/tmp.4Sl19clYQj ++ rm /tmp/tmp.GQq7mLNnNB /tmp/tmp.4Sl19clYQj ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.iNofunrhvA ++ mktemp + local LAST_ERR=/tmp/tmp.nNEam5uc65 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.iNofunrhvA Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2" modified. + cat /tmp/tmp.nNEam5uc65 + rm /tmp/tmp.iNofunrhvA /tmp/tmp.nNEam5uc65 + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.IUg1gR2vhi ++ mktemp + local LAST_ERR=/tmp/tmp.sGsGmABcn1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.IUg1gR2vhi customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.sGsGmABcn1 + rm /tmp/tmp.IUg1gR2vhi /tmp/tmp.sGsGmABcn1 + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/deploy/cw-rbac.yaml + kubectl_bin apply -f - + sed -e 's^namespace: .*^namespace: pxc-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.iNXAjkNjnT ++ mktemp + local LAST_ERR=/tmp/tmp.7JuMpBgEGc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.iNXAjkNjnT clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.7JuMpBgEGc + rm /tmp/tmp.iNXAjkNjnT /tmp/tmp.7JuMpBgEGc + return 0 + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-2414-d346d577^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "VERBOSE"' - + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "PXCO_FEATURE_GATES").value) = ""' - + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/deploy/cw-operator.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.v637uBFMnT ++ mktemp + local LAST_ERR=/tmp/tmp.3EuGUrwEmQ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.v637uBFMnT deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.3EuGUrwEmQ + rm /tmp/tmp.v637uBFMnT /tmp/tmp.3EuGUrwEmQ + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.zqXPNZktLu ++ mktemp + local LAST_ERR=/tmp/tmp.GYBGIRDewj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.zqXPNZktLu pod/percona-xtradb-cluster-operator-59d5c8749-bqfl4 condition met + cat /tmp/tmp.GYBGIRDewj + rm /tmp/tmp.zqXPNZktLu /tmp/tmp.GYBGIRDewj + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator ++ head -1 ++ jq -r '.items[] | select(.metadata.deletionTimestamp == null) | .metadata.name' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2zdZ4OYsjN +++ mktemp ++ local LAST_ERR=/tmp/tmp.rDu4tQiDCm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2zdZ4OYsjN ++ cat /tmp/tmp.rDu4tQiDCm ++ rm /tmp/tmp.2zdZ4OYsjN /tmp/tmp.rDu4tQiDCm ++ return 0 + wait_pod percona-xtradb-cluster-operator-59d5c8749-bqfl4 480 pxc-operator + local pod=percona-xtradb-cluster-operator-59d5c8749-bqfl4 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-59d5c8749-bqfl4 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-59d5c8749-bqfl4 condition met waiting for pod/percona-xtradb-cluster-operator-59d5c8749-bqfl4 to become Ready.Ok + sleep 3 + create_namespace tls-issue-cert-manager-ref-23205 + local namespace=tls-issue-cert-manager-ref-23205 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ awk '{print $1}' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get clusterrolebinding + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces tls-issue-cert-manager-ref-23205' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces tls-issue-cert-manager-ref-23205 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace tls-issue-cert-manager-ref-23205 ++ mktemp + local LAST_OUT=/tmp/tmp.0PvUHPjaO1 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.8jBuUQpNfc ++ mktemp + local LAST_ERR=/tmp/tmp.NwbMZWOt2I + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.IMjct9MNL7 + local exit_status=0 + for i in '$(seq 0 2)' + set +e + kubectl get ns + awk '{print$1}' + xargs kubectl delete ns ++ seq 0 2 + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-ref-23205 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-ref-23205 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8jBuUQpNfc + cat /tmp/tmp.NwbMZWOt2I + rm /tmp/tmp.8jBuUQpNfc /tmp/tmp.NwbMZWOt2I + return 0 error: resource(s) were provided, but no name was specified + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-ref-23205 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.0PvUHPjaO1 + cat /tmp/tmp.IMjct9MNL7 Error from server (NotFound): namespaces "tls-issue-cert-manager-ref-23205" not found + rm /tmp/tmp.0PvUHPjaO1 /tmp/tmp.IMjct9MNL7 + return 1 + : + wait_for_delete namespace/tls-issue-cert-manager-ref-23205 + local res=namespace/tls-issue-cert-manager-ref-23205 + echo -n 'waiting for namespace/tls-issue-cert-manager-ref-23205 to be deleted' waiting for namespace/tls-issue-cert-manager-ref-23205 to be deleted+ set +o xtrace Error from server (NotFound): namespaces "tls-issue-cert-manager-ref-23205" not found + desc 'create namespace tls-issue-cert-manager-ref-23205' + set +o xtrace ----------------------------------------------------------------------------------- create namespace tls-issue-cert-manager-ref-23205 ----------------------------------------------------------------------------------- + kubectl_bin create namespace tls-issue-cert-manager-ref-23205 ++ mktemp + local LAST_OUT=/tmp/tmp.H2Wu4OeNA3 ++ mktemp + local LAST_ERR=/tmp/tmp.8DWW99ttcJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace tls-issue-cert-manager-ref-23205 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.H2Wu4OeNA3 namespace/tls-issue-cert-manager-ref-23205 created + cat /tmp/tmp.8DWW99ttcJ + rm /tmp/tmp.H2Wu4OeNA3 /tmp/tmp.8DWW99ttcJ + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.NTBGQDnIXM +++ mktemp ++ local LAST_ERR=/tmp/tmp.6oifUDn49D ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NTBGQDnIXM ++ cat /tmp/tmp.6oifUDn49D ++ rm /tmp/tmp.NTBGQDnIXM /tmp/tmp.6oifUDn49D ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2 --namespace=tls-issue-cert-manager-ref-23205 ++ mktemp + local LAST_OUT=/tmp/tmp.yXSW75mkeN ++ mktemp + local LAST_ERR=/tmp/tmp.5sS0GZubxg + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2 --namespace=tls-issue-cert-manager-ref-23205 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.yXSW75mkeN Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2414-d346d577-10-cluster2" modified. + cat /tmp/tmp.5sS0GZubxg + rm /tmp/tmp.yXSW75mkeN /tmp/tmp.5sS0GZubxg + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.O7DaO1yNBF ++ mktemp + local LAST_ERR=/tmp/tmp.fnO3zzWi87 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.O7DaO1yNBF secret/minio-secret created secret/aws-s3-secret created secret/do-spaces-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.fnO3zzWi87 + rm /tmp/tmp.O7DaO1yNBF /tmp/tmp.fnO3zzWi87 + return 0 + cluster=some-name-tls-issueref + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.4KcRsLilJg ++ mktemp + local LAST_ERR=/tmp/tmp.SCNwaq19HE + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4KcRsLilJg namespace/cert-manager created + cat /tmp/tmp.SCNwaq19HE + rm /tmp/tmp.4KcRsLilJg /tmp/tmp.SCNwaq19HE + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.8WHVdIzjh0 ++ mktemp + local LAST_ERR=/tmp/tmp.AFhgcZd6yJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8WHVdIzjh0 namespace/cert-manager labeled + cat /tmp/tmp.AFhgcZd6yJ + rm /tmp/tmp.8WHVdIzjh0 /tmp/tmp.AFhgcZd6yJ + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.19.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.3SSmEriaTG ++ mktemp + local LAST_ERR=/tmp/tmp.UQMjZDKWPv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.19.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.3SSmEriaTG namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.UQMjZDKWPv Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.3SSmEriaTG /tmp/tmp.UQMjZDKWPv + return 0 + '[' '' == 4.10 ']' + sleep 70 + desc 'create issuer' + set +o xtrace ----------------------------------------------------------------------------------- create issuer ----------------------------------------------------------------------------------- + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/issuer.yml + local config_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/issuer.yml + local pvc_name= + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/issuer.yml '' + local input_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/issuer.yml + kubectl_bin apply -f - + local pvc_name= + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/issuer.yml ++ mktemp + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + local LAST_OUT=/tmp/tmp.4fScP01eBl + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2414-d346d577#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/fluentbit:main-logcollector#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-ref-23205~ + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#claimName:..*-backup-pvc$#claimName: #' + local LAST_ERR=/tmp/tmp.VhhBQd48qU + local exit_status=0 ++ seq 0 2 + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4fScP01eBl clusterissuer.cert-manager.io/special-selfsigned-issuer created + cat /tmp/tmp.VhhBQd48qU + rm /tmp/tmp.4fScP01eBl /tmp/tmp.VhhBQd48qU + return 0 + sleep 10 + desc 'create pxc cluster' + set +o xtrace ----------------------------------------------------------------------------------- create pxc cluster ----------------------------------------------------------------------------------- + spinup_pxc some-name-tls-issueref /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml 3 10 /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/secrets_without_tls.yml /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + local cluster=some-name-tls-issueref + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.yk7Mt93T2K ++ mktemp + local LAST_ERR=/tmp/tmp.DqW8lidSjI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.yk7Mt93T2K secret/my-cluster-secrets created + cat /tmp/tmp.DqW8lidSjI + rm /tmp/tmp.yk7Mt93T2K /tmp/tmp.DqW8lidSjI + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + local config_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + local pvc_name= + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml '' + local input_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + local pvc_name= + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/client.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2414-d346d577#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_OUT=/tmp/tmp.DOEWw1lwnM + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/fluentbit:main-logcollector#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' ++ mktemp + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-ref-23205~ + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.0UqsErwlzh + local exit_status=0 ++ seq 0 2 + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + for i in '$(seq 0 2)' + /usr/bin/sed -e 's#claimName:..*-backup-pvc$#claimName: #' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DOEWw1lwnM deployment.apps/pxc-client created + cat /tmp/tmp.0UqsErwlzh + rm /tmp/tmp.DOEWw1lwnM /tmp/tmp.0UqsErwlzh + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml + local config_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml + local pvc_name= + '[' -z '' ']' + kubectl_bin apply -f - + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml '' + local input_file=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml + local pvc_name= + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/conf/some-name-tls-issueref.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#claimName:..*-backup-pvc$#claimName: #' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2414-d346d577#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.tls-issue-cert-manager-ref-23205~ + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/fluentbit:main-logcollector#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' ++ mktemp + local LAST_OUT=/tmp/tmp.psPcRumoIJ ++ mktemp + local LAST_ERR=/tmp/tmp.9gP7cxItlk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.psPcRumoIJ perconaxtradbcluster.pxc.percona.com/some-name-tls-issueref created + cat /tmp/tmp.9gP7cxItlk + rm /tmp/tmp.psPcRumoIJ /tmp/tmp.9gP7cxItlk + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name-tls-issueref ++ local target_cluster=some-name-tls-issueref +++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.IbLRwlbXlD ++++ mktemp +++ local LAST_ERR=/tmp/tmp.F0bLqUCVpM +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.IbLRwlbXlD +++ cat /tmp/tmp.F0bLqUCVpM +++ rm /tmp/tmp.IbLRwlbXlD /tmp/tmp.F0bLqUCVpM +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.KudMZDGJsT ++++ mktemp +++ local LAST_ERR=/tmp/tmp.OarJG4Jl6m +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.KudMZDGJsT +++ cat /tmp/tmp.OarJG4Jl6m +++ rm /tmp/tmp.KudMZDGJsT /tmp/tmp.OarJG4Jl6m +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-tls-issueref-proxysql ++ return + local proxy=some-name-tls-issueref-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-ref-23205 ++ mktemp + local LAST_OUT=/tmp/tmp.ArKLUw7TsK ++ mktemp + local LAST_ERR=/tmp/tmp.1Mg5Kv7fju + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-ref-23205 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-ref-23205 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n tls-issue-cert-manager-ref-23205 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.ArKLUw7TsK + cat /tmp/tmp.1Mg5Kv7fju error: no matching resources found + rm /tmp/tmp.ArKLUw7TsK /tmp/tmp.1Mg5Kv7fju + return 1 + true + wait_for_running some-name-tls-issueref-proxysql 1 + local name=some-name-tls-issueref-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issueref-proxysql-0 480 + local pod=some-name-tls-issueref-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issueref-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/some-name-tls-issueref-proxysql-0 condition met waiting for pod/some-name-tls-issueref-proxysql-0 to become Ready.Ok + wait_for_running some-name-tls-issueref-pxc 3 + local name=some-name-tls-issueref-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issueref-pxc-0 480 + local pod=some-name-tls-issueref-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-tls-issueref-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-tls-issueref-pxc-0 condition met waiting for pod/some-name-tls-issueref-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issueref-pxc-1 480 + local pod=some-name-tls-issueref-pxc-1 + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' ++ echo some-name-tls-issueref-pxc-1 + local container=pxc + set +o xtrace pod/some-name-tls-issueref-pxc-1 condition met waiting for pod/some-name-tls-issueref-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-tls-issueref-pxc-2 480 + local pod=some-name-tls-issueref-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-tls-issueref-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-tls-issueref-pxc-2 condition met waiting for pod/some-name-tls-issueref-pxc-2 to become Ready.Ok + sleep 10 ++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.spec.secretsName}' + local secret_name=my-cluster-secrets ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nRAZIxZ1uh ++ base64 --decode +++ mktemp ++ local LAST_ERR=/tmp/tmp.TGK0OJd4qR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nRAZIxZ1uh ++ cat /tmp/tmp.TGK0OJd4qR ++ rm /tmp/tmp.nRAZIxZ1uh /tmp/tmp.TGK0OJd4qR ++ return 0 + local root_pass=root_password + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-tls-issueref-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-tls-issueref-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MPFUTYNUqP +++ mktemp ++ local LAST_ERR=/tmp/tmp.cSyKZNmdMV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MPFUTYNUqP ++ cat /tmp/tmp.cSyKZNmdMV ++ rm /tmp/tmp.MPFUTYNUqP /tmp/tmp.cSyKZNmdMV ++ return 0 + client_pod=pxc-client-6b988f8474-qfx4t + wait_pod pxc-client-6b988f8474-qfx4t + local pod=pxc-client-6b988f8474-qfx4t + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ echo pxc-client-6b988f8474-qfx4t ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-6b988f8474-qfx4t condition met waiting for pod/pxc-client-6b988f8474-qfx4t to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-tls-issueref-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-tls-issueref-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hUkDs0nUiz +++ mktemp ++ local LAST_ERR=/tmp/tmp.cvKH6fSoSM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hUkDs0nUiz ++ cat /tmp/tmp.cvKH6fSoSM ++ rm /tmp/tmp.hUkDs0nUiz /tmp/tmp.cvKH6fSoSM ++ return 0 + client_pod=pxc-client-6b988f8474-qfx4t + wait_pod pxc-client-6b988f8474-qfx4t + local pod=pxc-client-6b988f8474-qfx4t + local max_retry=480 + local ns= ++ echo pxc-client-6b988f8474-qfx4t ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6b988f8474-qfx4t condition met waiting for pod/pxc-client-6b988f8474-qfx4t to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-0.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-0.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-0.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-0.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.V6yo0Ov6AO +++ mktemp ++ local LAST_ERR=/tmp/tmp.HUYeGs71NW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.V6yo0Ov6AO ++ cat /tmp/tmp.HUYeGs71NW ++ rm /tmp/tmp.V6yo0Ov6AO /tmp/tmp.HUYeGs71NW ++ return 0 + client_pod=pxc-client-6b988f8474-qfx4t + wait_pod pxc-client-6b988f8474-qfx4t + local pod=pxc-client-6b988f8474-qfx4t + local max_retry=480 + local ns= ++ echo pxc-client-6b988f8474-qfx4t ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-6b988f8474-qfx4t condition met waiting for pod/pxc-client-6b988f8474-qfx4t to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ ! -s /tmp/tmp.Z7Q4HOVoG9/select-1.sql ]] ++ grep 'Unknown MySQL server host' /tmp/tmp.Z7Q4HOVoG9/select-1.sql + [[ -n '' ]] + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql /tmp/tmp.Z7Q4HOVoG9/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-1.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-1.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-1.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-1.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9SHO5mdkrt +++ mktemp ++ local LAST_ERR=/tmp/tmp.90luPpD2SI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9SHO5mdkrt ++ cat /tmp/tmp.90luPpD2SI ++ rm /tmp/tmp.9SHO5mdkrt /tmp/tmp.90luPpD2SI ++ return 0 + client_pod=pxc-client-6b988f8474-qfx4t + wait_pod pxc-client-6b988f8474-qfx4t + local pod=pxc-client-6b988f8474-qfx4t + local max_retry=480 + local ns= ++ echo pxc-client-6b988f8474-qfx4t ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6b988f8474-qfx4t condition met waiting for pod/pxc-client-6b988f8474-qfx4t to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ ! -s /tmp/tmp.Z7Q4HOVoG9/select-1.sql ]] ++ grep 'Unknown MySQL server host' /tmp/tmp.Z7Q4HOVoG9/select-1.sql + [[ -n '' ]] + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql /tmp/tmp.Z7Q4HOVoG9/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-2.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-2.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1-80.sql ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-tls-issueref-pxc-2.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-tls-issueref-pxc-2.some-name-tls-issueref-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GVEUcXC7km +++ mktemp ++ local LAST_ERR=/tmp/tmp.NpicJkJK6L ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GVEUcXC7km ++ cat /tmp/tmp.NpicJkJK6L ++ rm /tmp/tmp.GVEUcXC7km /tmp/tmp.NpicJkJK6L ++ return 0 + client_pod=pxc-client-6b988f8474-qfx4t + wait_pod pxc-client-6b988f8474-qfx4t + local pod=pxc-client-6b988f8474-qfx4t + local max_retry=480 + local ns= ++ echo pxc-client-6b988f8474-qfx4t ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-6b988f8474-qfx4t condition met waiting for pod/pxc-client-6b988f8474-qfx4t to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ ! -s /tmp/tmp.Z7Q4HOVoG9/select-1.sql ]] ++ grep 'Unknown MySQL server host' /tmp/tmp.Z7Q4HOVoG9/select-1.sql + [[ -n '' ]] + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/select-1.sql /tmp/tmp.Z7Q4HOVoG9/select-1.sql + is_keyring_plugin_in_use some-name-tls-issueref + local cluster=some-name-tls-issueref + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + grep -E -o 'early-plugin-load=keyring_\w+.so' + kubectl exec some-name-tls-issueref-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' + return 1 + wait_cluster_consistency some-name-tls-issueref 3 2 + local cluster_name=some-name-tls-issueref + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=300 + sleep 7 + echo -n 'waiting for pxc/some-name-tls-issueref to be ready' waiting for pxc/some-name-tls-issueref to be ready++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.niPQIXhVc0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.MTsHYzr8yW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.niPQIXhVc0 ++ cat /tmp/tmp.MTsHYzr8yW ++ rm /tmp/tmp.niPQIXhVc0 /tmp/tmp.MTsHYzr8yW ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4QbuIQoEp8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.JE9clBBukg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4QbuIQoEp8 ++ cat /tmp/tmp.JE9clBBukg ++ rm /tmp/tmp.4QbuIQoEp8 /tmp/tmp.JE9clBBukg ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name-tls-issueref +++ local cluster_name=some-name-tls-issueref ++++ get_proxy some-name-tls-issueref ++++ local target_cluster=some-name-tls-issueref +++++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.JUzsjwcnq5 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.PLhxbTExiD +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.JUzsjwcnq5 +++++ cat /tmp/tmp.PLhxbTExiD +++++ rm /tmp/tmp.JUzsjwcnq5 /tmp/tmp.PLhxbTExiD +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.ZHT5sLggdc ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Y2iLbVkp9g +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.ZHT5sLggdc +++++ cat /tmp/tmp.Y2iLbVkp9g +++++ rm /tmp/tmp.ZHT5sLggdc /tmp/tmp.Y2iLbVkp9g +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-tls-issueref-proxysql ++++ return +++ local cluster_proxy=some-name-tls-issueref-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name-tls-issueref -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jg0tJawMMi +++ mktemp ++ local LAST_ERR=/tmp/tmp.nleYRhzYnw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name-tls-issueref -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jg0tJawMMi ++ cat /tmp/tmp.nleYRhzYnw ++ rm /tmp/tmp.jg0tJawMMi /tmp/tmp.nleYRhzYnw ++ return 0 + [[ 2 == \2 ]] + echo + desc 'check if certificates issued with certmanager' + set +o xtrace ----------------------------------------------------------------------------------- check if certificates issued with certmanager ----------------------------------------------------------------------------------- + tlsSecretsShouldExist some-name-tls-issueref-ssl + local secretName=some-name-tls-issueref-ssl + checkTLSSecret some-name-tls-issueref-ssl ca.crt + local secretName=some-name-tls-issueref-ssl + local dataKey=ca.crt ++ kubectl_bin get secrets/some-name-tls-issueref-ssl -o json ++ jq '.data["ca.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nhEhHuYuRr +++ mktemp ++ local LAST_ERR=/tmp/tmp.LCmN8mNJ6m ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issueref-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nhEhHuYuRr ++ cat /tmp/tmp.LCmN8mNJ6m ++ rm /tmp/tmp.nhEhHuYuRr /tmp/tmp.LCmN8mNJ6m ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issueref-ssl tls.crt + local secretName=some-name-tls-issueref-ssl + local dataKey=tls.crt ++ kubectl_bin get secrets/some-name-tls-issueref-ssl -o json ++ jq '.data["tls.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SkQQbVDpkC +++ mktemp ++ local LAST_ERR=/tmp/tmp.kBGAgknv97 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issueref-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SkQQbVDpkC ++ cat /tmp/tmp.kBGAgknv97 ++ rm /tmp/tmp.SkQQbVDpkC /tmp/tmp.kBGAgknv97 ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + checkTLSSecret some-name-tls-issueref-ssl tls.key + local secretName=some-name-tls-issueref-ssl + local dataKey=tls.key ++ kubectl_bin get secrets/some-name-tls-issueref-ssl -o json ++ jq '.data["tls.key"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.z8lIH4KZ9q +++ mktemp ++ local LAST_ERR=/tmp/tmp.xBbo6dyHxT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-tls-issueref-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.z8lIH4KZ9q ++ cat /tmp/tmp.xBbo6dyHxT ++ rm /tmp/tmp.z8lIH4KZ9q /tmp/tmp.xBbo6dyHxT ++ return 0 + local 'secretData="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"' + '[' -z '"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"' ']' + desc 'check if issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer created ----------------------------------------------------------------------------------- + compare_kubectl clusterissuer/special-selfsigned-issuer + local resource=clusterissuer/special-selfsigned-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer.yml + local new_result=/tmp/tmp.Z7Q4HOVoG9/clusterissuer_special-selfsigned-issuer.yml + desc 'compare clusterissuer/special-selfsigned-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare clusterissuer/special-selfsigned-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-80.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.32 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.32 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k129.yml ']' + version_gt 1.27 ++ echo '1.32 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k127.yml ']' + version_gt 1.24 ++ echo '1.32 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k124.yml ']' + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k122.yml ']' + version_gt 1.21 ++ echo '1.32 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-oc.yml ']' + version_gt 1.29 ++ echo '1.32 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer-aks.yml ']' + kubectl_bin get -o yaml clusterissuer/special-selfsigned-issuer + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.spec.template.spec.containers[].env[] | select(.name == "XTRABACKUP_ENABLED")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.metadata.annotations."kubernetes.digitalocean.com/load-balancer-id") | del(.metadata.annotations."service.beta.kubernetes.io/do-loadbalancer-type") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-ref-23205", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.RrQDeVRA5n ++ mktemp + local LAST_ERR=/tmp/tmp.P3N6G8FSXU + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml clusterissuer/special-selfsigned-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RrQDeVRA5n + cat /tmp/tmp.P3N6G8FSXU + rm /tmp/tmp.RrQDeVRA5n /tmp/tmp.P3N6G8FSXU + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/clusterissuer_special-selfsigned-issuer.yml /tmp/tmp.Z7Q4HOVoG9/clusterissuer_special-selfsigned-issuer.yml + log 'compare_kubectl: clusterissuer/special-selfsigned-issuer OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2026-04-08T10:39:44+0000]' compare_kubectl: clusterissuer/special-selfsigned-issuer OK [2026-04-08T10:39:44+0000] compare_kubectl: clusterissuer/special-selfsigned-issuer OK + desc 'check if issuer used during certificate creation' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer used during certificate creation ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-tls-issueref-ssl + local resource=certificate/some-name-tls-issueref-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl.yml + local new_result=/tmp/tmp.Z7Q4HOVoG9/certificate_some-name-tls-issueref-ssl.yml + desc 'compare certificate/some-name-tls-issueref-ssl-' + set +o xtrace ----------------------------------------------------------------------------------- compare certificate/some-name-tls-issueref-ssl- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-80.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.32 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.32 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k129.yml ']' + version_gt 1.27 ++ echo '1.32 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k127.yml ']' + version_gt 1.24 ++ echo '1.32 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k124.yml ']' + version_gt 1.22 ++ echo '1.32 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k122.yml ']' + version_gt 1.21 ++ echo '1.32 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-oc.yml ']' + version_gt 1.29 ++ echo '1.32 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl-aks.yml ']' + kubectl_bin get -o yaml certificate/some-name-tls-issueref-ssl + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.spec.template.spec.containers[].env[] | select(.name == "XTRABACKUP_ENABLED")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.metadata.annotations."kubernetes.digitalocean.com/load-balancer-id") | del(.metadata.annotations."service.beta.kubernetes.io/do-loadbalancer-type") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-ref-23205", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.eZw4GHeH9X ++ mktemp + local LAST_ERR=/tmp/tmp.lFf2RKDCL8 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-tls-issueref-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.eZw4GHeH9X + cat /tmp/tmp.lFf2RKDCL8 + rm /tmp/tmp.eZw4GHeH9X /tmp/tmp.lFf2RKDCL8 + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2414/e2e-tests/tls-issue-cert-manager-ref/compare/certificate_some-name-tls-issueref-ssl.yml /tmp/tmp.Z7Q4HOVoG9/certificate_some-name-tls-issueref-ssl.yml + log 'compare_kubectl: certificate/some-name-tls-issueref-ssl OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2026-04-08T10:39:44+0000]' compare_kubectl: certificate/some-name-tls-issueref-ssl OK [2026-04-08T10:39:44+0000] compare_kubectl: certificate/some-name-tls-issueref-ssl OK + destroy tls-issue-cert-manager-ref-23205 + local namespace=tls-issue-cert-manager-ref-23205 + local ignore_logs=true + [[ 0 == 1 ]] + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ + grep -v 'get backup status: Job.batch' + sort -u + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + grep -v 'the object has been modified' + grep -v level=info + tee /tmp/tmp.Z7Q4HOVoG9/operator.log +++ grep -c percona-xtradb-cluster-operator +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ jq -r '.items[] | select(.metadata.deletionTimestamp == null) | .metadata.name' ++ head -1 ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.shPIVzzl7M +++ mktemp ++ local LAST_ERR=/tmp/tmp.s8sRlnW67S ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.shPIVzzl7M ++ cat /tmp/tmp.s8sRlnW67S ++ rm /tmp/tmp.shPIVzzl7M /tmp/tmp.s8sRlnW67S ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-59d5c8749-bqfl4 ++ mktemp + local LAST_OUT=/tmp/tmp.7SzGArCBkS ++ mktemp + local LAST_ERR=/tmp/tmp.3lLVMYiaH9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-59d5c8749-bqfl4 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7SzGArCBkS + cat /tmp/tmp.3lLVMYiaH9 + rm /tmp/tmp.7SzGArCBkS /tmp/tmp.3lLVMYiaH9 + return 0 2026-04-08T10:31:33.723Z INFO setup Feature gates {"PXCO_FEATURE_GATES": "", "enabled": ""} 2026-04-08T10:31:33.723Z INFO setup Manager starting up {"gitCommit": "d346d5776e1753d2ff76296a598e4fe17792f52b", "gitBranch": "PR-2414-d346d577", "buildTime": "2026-04-08T06:42:33Z", "goVersion": "go1.25.9", "os": "linux", "arch": "amd64"} 2026-04-08T10:31:33.723Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.32.13-gke.1205000"} 2026-04-08T10:31:33.727Z INFO setup Registering Components. 2026-04-08T10:31:34.210Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2026-04-08T10:31:34.210Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2026-04-08T10:31:34.210Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2026-04-08T10:31:34.210Z INFO controller-runtime.metrics Starting metrics server 2026-04-08T10:31:34.210Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2026-04-08T10:31:34.210Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2026-04-08T10:31:34.210Z INFO controller-runtime.webhook Starting webhook server 2026-04-08T10:31:34.210Z INFO setup Starting the Cmd. 2026-04-08T10:31:34.210Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2026-04-08T10:31:34.311Z INFO Attempting to acquire leader lease... {"lock": "pxc-operator/08db1feb.percona.com"} 2026-04-08T10:31:34.339Z DEBUG events percona-xtradb-cluster-operator-59d5c8749-bqfl4_768f0d4a-c650-4d12-9981-fb21e4d4f88f became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"bdba2d8c-7a2f-45d1-b5ef-bcf3b7ef5d71","apiVersion":"coordination.k8s.io/v1","resourceVersion":"1775644294333199009"}, "reason": "LeaderElection"} 2026-04-08T10:31:34.339Z INFO Starting EventSource {"controller": "pxcrestore-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterRestore", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2026-04-08T10:31:34.339Z INFO Successfully acquired lease {"lock": "pxc-operator/08db1feb.percona.com"} 2026-04-08T10:31:34.340Z INFO Starting EventSource {"controller": "pxcbackup-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterBackup", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2026-04-08T10:31:34.340Z INFO Starting EventSource {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "source": "kind source: *v1.Secret"} 2026-04-08T10:31:34.341Z INFO Starting EventSource {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "source": "kind source: *v1.PerconaXtraDBCluster"} 2026-04-08T10:31:34.441Z INFO Starting Controller {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster"} 2026-04-08T10:31:34.441Z INFO Starting workers {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "worker count": 1} 2026-04-08T10:31:34.541Z INFO Starting Controller {"controller": "pxcbackup-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterBackup"} 2026-04-08T10:31:34.541Z INFO Starting workers {"controller": "pxcbackup-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterBackup", "worker count": 1} 2026-04-08T10:31:34.543Z INFO Starting Controller {"controller": "pxcrestore-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterRestore"} 2026-04-08T10:31:34.543Z INFO Starting workers {"controller": "pxcrestore-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBClusterRestore", "worker count": 1} 2026-04-08T10:33:55.993Z INFO Set CR version {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "version": "1.20.0"} 2026-04-08T10:33:56.360Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2"} 2026-04-08T10:33:56.385Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2"} 2026-04-08T10:33:59.487Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "auto-some-name-tls-issueref-pxc", "kind": "&TypeMeta{Kind:ConfigMap,APIVersion:v1,}"} 2026-04-08T10:33:59.612Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2026-04-08T10:33:59.657Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2026-04-08T10:33:59.706Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-pxc", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2026-04-08T10:33:59.754Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-pxc-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2026-04-08T10:33:59.807Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-proxysql", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2026-04-08T10:33:59.915Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "ddeaf0ca-a0c3-44bd-95d3-e932ba5ad2f2", "object": "some-name-tls-issueref-proxysql-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2026-04-08T10:34:00.582Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "34cd9dcd-4729-482d-9663-8cadf629b917", "object": "some-name-tls-issueref-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2026-04-08T10:34:00.607Z DEBUG Creating object {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "34cd9dcd-4729-482d-9663-8cadf629b917", "object": "some-name-tls-issueref-proxysql", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2026-04-08T10:35:22.726Z INFO Password expiration policy updated {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a", "user": "operator"} 2026-04-08T10:35:22.781Z INFO Password expiration policy updated {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a", "user": "monitor"} 2026-04-08T10:35:22.854Z INFO User monitor: granted privileges {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a"} 2026-04-08T10:35:22.898Z INFO monitor user privileges granted {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a"} 2026-04-08T10:35:22.937Z INFO Password expiration policy updated {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a", "user": "xtrabackup"} 2026-04-08T10:35:22.991Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a"} 2026-04-08T10:35:23.045Z INFO Password expiration policy updated {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a", "user": "replication"} 2026-04-08T10:35:23.053Z INFO reconcile replication error {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "48cd43a3-8826-4a64-bb39-02cc6fbf065a", "err": "get primary pxc pod: not found"} 2026-04-08T10:35:28.343Z INFO reconcile replication error {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "722c9b89-7d0f-4cac-90b2-d73076769050", "err": "get primary pxc pod: not found"} 2026-04-08T10:35:33.492Z INFO reconcile replication error {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "35443c31-d1f5-439f-b10b-d53da02ebd9b", "err": "get primary pxc pod: not found"} 2026-04-08T10:35:38.654Z INFO reconcile replication error {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "cadcfb85-069f-468e-82eb-21c2d6a47ef0", "err": "get primary pxc pod: not found"} 2026-04-08T10:38:06.150Z INFO Password expiration policy updated {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "b5c0d70a-7c6f-4fb0-a095-5ce381a3d814", "user": "root"} 2026-04-08T10:38:06.250Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "b5c0d70a-7c6f-4fb0-a095-5ce381a3d814", "new version": "8.0.43-34.1"} 2026-04-08T10:38:08.038Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "b5c0d70a-7c6f-4fb0-a095-5ce381a3d814"} 2026-04-08T10:38:14.213Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "cf9cd709-e977-40f4-bd23-a758a48179c1"} 2026-04-08T10:38:19.527Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "68b5ba23-ad61-4552-8628-b7036b9627d0"} 2026-04-08T10:38:25.107Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "7e3ba71a-1cc2-42d9-ba17-02a60f02ac7c"} 2026-04-08T10:38:30.241Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "97b32acd-475d-45df-9a55-ac70f02faf74"} 2026-04-08T10:38:35.629Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "9a2c7cb4-4327-4d86-b3f5-8f1ff93184b9"} 2026-04-08T10:38:41.029Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "73cf03a7-bf43-4788-a84c-e33a23fc7e75"} 2026-04-08T10:38:46.030Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "e04406b9-3196-4ec7-85ab-f188ff5d94fa"} 2026-04-08T10:38:51.741Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "86620691-bdff-436d-b4fa-651fc72a8da0"} 2026-04-08T10:38:57.616Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "a93bc6a5-7b24-4452-8735-a1622aefebad"} 2026-04-08T10:39:02.617Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "841b4126-b04a-48b0-a90e-6c8a45379991"} 2026-04-08T10:39:07.842Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "0b3b5d61-755b-48ad-8b7c-6e83ffe35da9"} 2026-04-08T10:39:13.486Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "aa229fd6-33ce-49c9-b504-4803f17ce50f"} 2026-04-08T10:39:18.431Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "b697345b-474a-4226-8fe0-0df2385f430d"} 2026-04-08T10:39:23.740Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "da2f91a0-8e1d-4133-84b0-1776f31bb982"} 2026-04-08T10:39:29.025Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "8755dc4b-2437-4fff-abf2-f899e646a6b5"} 2026-04-08T10:39:34.623Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "66089e17-882c-42eb-962d-0dfdc5d41243"} 2026-04-08T10:39:40.187Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "574ff86c-0007-4df8-bd57-8ef328bb80e4"} 2026-04-08T10:39:45.227Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "controllerGroup": "pxc.percona.com", "controllerKind": "PerconaXtraDBCluster", "PerconaXtraDBCluster": {"name":"some-name-tls-issueref","namespace":"tls-issue-cert-manager-ref-23205"}, "namespace": "tls-issue-cert-manager-ref-23205", "name": "some-name-tls-issueref", "reconcileID": "aa7e7b74-ad60-4f84-8346-8d043057400a"} + grep -v NAMESPACE + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n tls-issue-cert-manager-ref-23205 some-name-tls-issueref --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name-tls-issueref patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.8WxzXnJvUz ++ mktemp + local LAST_ERR=/tmp/tmp.FEdCiy1iXr + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8WxzXnJvUz perconaxtradbcluster.pxc.percona.com "some-name-tls-issueref" deleted from tls-issue-cert-manager-ref-23205 namespace + cat /tmp/tmp.FEdCiy1iXr + rm /tmp/tmp.8WxzXnJvUz /tmp/tmp.FEdCiy1iXr + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.2MDz6xFPHL ++ mktemp + local LAST_ERR=/tmp/tmp.9S6XseQaey + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.2MDz6xFPHL No resources found + cat /tmp/tmp.9S6XseQaey + rm /tmp/tmp.2MDz6xFPHL /tmp/tmp.9S6XseQaey + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.eBSBnc6nqm ++ mktemp + local LAST_ERR=/tmp/tmp.0UZYluOHL0 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.eBSBnc6nqm No resources found + cat /tmp/tmp.0UZYluOHL0 + rm /tmp/tmp.eBSBnc6nqm /tmp/tmp.0UZYluOHL0 + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.RiJVACNw4E ++ mktemp + local LAST_ERR=/tmp/tmp.GAjhDvV1Ii + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RiJVACNw4E validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.GAjhDvV1Ii + rm /tmp/tmp.RiJVACNw4E /tmp/tmp.GAjhDvV1Ii + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.19.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace tls-issue-cert-manager-ref-23205 + rm -rf /tmp/tmp.Z7Q4HOVoG9 ++ mktemp + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- ++ mktemp + local LAST_OUT=/tmp/tmp.kfDFPoFcsG + local LAST_OUT=/tmp/tmp.puNLoq5hgW ++ mktemp + local LAST_ERR=/tmp/tmp.N76Rk6VgjR + local exit_status=0 ++ mktemp ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + local LAST_ERR=/tmp/tmp.1GY0gVIEm8 + local exit_status=0 + kubectl delete --grace-period=0 --force=true namespace tls-issue-cert-manager-ref-23205 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator