2026-02-27 08:35:44,423 p=13005 u=zuul n=ansible | Starting galaxy collection install process 2026-02-27 08:35:44,424 p=13005 u=zuul n=ansible | Process install dependency map 2026-02-27 08:36:20,084 p=13005 u=zuul n=ansible | Starting collection install process 2026-02-27 08:36:20,084 p=13005 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+9d70f418' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2026-02-27 08:36:21,463 p=13005 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+9d70f418 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2026-02-27 08:36:21,463 p=13005 u=zuul n=ansible | cifmw.general:1.0.0+9d70f418 was installed successfully 2026-02-27 08:36:21,463 p=13005 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2026-02-27 08:36:21,501 p=13005 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2026-02-27 08:36:21,501 p=13005 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2026-02-27 08:36:21,501 p=13005 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2026-02-27 08:36:22,027 p=13005 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2026-02-27 08:36:22,027 p=13005 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2026-02-27 08:36:22,027 p=13005 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2026-02-27 08:36:22,063 p=13005 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2026-02-27 08:36:22,063 p=13005 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2026-02-27 08:36:22,063 p=13005 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2026-02-27 08:36:22,137 p=13005 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2026-02-27 08:36:22,137 p=13005 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2026-02-27 08:36:22,138 p=13005 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2026-02-27 08:36:22,154 p=13005 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2026-02-27 08:36:22,154 p=13005 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2026-02-27 08:36:22,155 p=13005 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2026-02-27 08:36:22,254 p=13005 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2026-02-27 08:36:22,254 p=13005 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2026-02-27 08:36:22,254 p=13005 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2026-02-27 08:36:22,340 p=13005 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2026-02-27 08:36:22,340 p=13005 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2026-02-27 08:36:22,340 p=13005 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2026-02-27 08:36:22,388 p=13005 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2026-02-27 08:36:22,388 p=13005 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2026-02-27 08:36:22,388 p=13005 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2026-02-27 08:36:22,401 p=13005 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2026-02-27 08:36:22,401 p=13005 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2026-02-27 08:36:22,401 p=13005 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2026-02-27 08:36:22,557 p=13005 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2026-02-27 08:36:22,558 p=13005 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2026-02-27 08:36:22,558 p=13005 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2026-02-27 08:36:22,742 p=13005 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2026-02-27 08:36:22,742 p=13005 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2026-02-27 08:36:22,742 p=13005 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2026-02-27 08:36:22,764 p=13005 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2026-02-27 08:36:22,764 p=13005 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2026-02-27 08:36:22,764 p=13005 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2026-02-27 08:36:22,784 p=13005 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2026-02-27 08:36:22,785 p=13005 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2026-02-27 08:36:22,785 p=13005 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2026-02-27 08:36:22,847 p=13005 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2026-02-27 08:36:22,848 p=13005 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2026-02-27 08:36:41,800 p=14952 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2026-02-27 08:36:41,827 p=14952 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2026-02-27 08:36:41,827 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:41 +0000 (0:00:00.047) 0:00:00.047 ******* 2026-02-27 08:36:41,827 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:41 +0000 (0:00:00.046) 0:00:00.046 ******* 2026-02-27 08:36:42,970 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:42,988 p=14952 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2026-02-27 08:36:42,988 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:42 +0000 (0:00:01.161) 0:00:01.208 ******* 2026-02-27 08:36:42,988 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:42 +0000 (0:00:01.160) 0:00:01.207 ******* 2026-02-27 08:36:43,318 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:43,324 p=14952 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2026-02-27 08:36:43,324 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.335) 0:00:01.544 ******* 2026-02-27 08:36:43,324 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.335) 0:00:01.542 ******* 2026-02-27 08:36:43,339 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2026-02-27 08:36:43,387 p=14952 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2026-02-27 08:36:43,388 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.063) 0:00:01.608 ******* 2026-02-27 08:36:43,388 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.063) 0:00:01.606 ******* 2026-02-27 08:36:43,411 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:43,418 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-02-27 08:36:43,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.030) 0:00:01.639 ******* 2026-02-27 08:36:43,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.030) 0:00:01.637 ******* 2026-02-27 08:36:43,446 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:43,453 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2026-02-27 08:36:43,453 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.034) 0:00:01.673 ******* 2026-02-27 08:36:43,453 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.034) 0:00:01.671 ******* 2026-02-27 08:36:43,515 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:43,534 p=14952 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-02-27 08:36:43,535 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.081) 0:00:01.755 ******* 2026-02-27 08:36:43,535 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.081) 0:00:01.753 ******* 2026-02-27 08:36:43,760 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:43,767 p=14952 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-02-27 08:36:43,767 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.232) 0:00:01.987 ******* 2026-02-27 08:36:43,767 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.232) 0:00:01.985 ******* 2026-02-27 08:36:43,786 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:43,794 p=14952 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-02-27 08:36:43,794 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.026) 0:00:02.014 ******* 2026-02-27 08:36:43,794 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.026) 0:00:02.012 ******* 2026-02-27 08:36:43,810 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:43,817 p=14952 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-02-27 08:36:43,817 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.023) 0:00:02.038 ******* 2026-02-27 08:36:43,817 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.023) 0:00:02.036 ******* 2026-02-27 08:36:43,840 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:43,847 p=14952 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-02-27 08:36:43,847 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.029) 0:00:02.067 ******* 2026-02-27 08:36:43,847 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.029) 0:00:02.066 ******* 2026-02-27 08:36:43,868 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:43,880 p=14952 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-02-27 08:36:43,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.033) 0:00:02.101 ******* 2026-02-27 08:36:43,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:43 +0000 (0:00:00.033) 0:00:02.099 ******* 2026-02-27 08:36:44,064 p=14952 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2026-02-27 08:36:44,234 p=14952 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2026-02-27 08:36:44,408 p=14952 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2026-02-27 08:36:44,417 p=14952 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2026-02-27 08:36:44,417 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:44 +0000 (0:00:00.536) 0:00:02.637 ******* 2026-02-27 08:36:44,417 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:44 +0000 (0:00:00.536) 0:00:02.635 ******* 2026-02-27 08:36:45,872 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:45,878 p=14952 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2026-02-27 08:36:45,879 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:45 +0000 (0:00:01.461) 0:00:04.099 ******* 2026-02-27 08:36:45,879 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:45 +0000 (0:00:01.461) 0:00:04.097 ******* 2026-02-27 08:36:47,174 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:47,181 p=14952 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2026-02-27 08:36:47,181 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:47 +0000 (0:00:01.302) 0:00:05.402 ******* 2026-02-27 08:36:47,181 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:47 +0000 (0:00:01.302) 0:00:05.400 ******* 2026-02-27 08:36:55,694 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:55,703 p=14952 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2026-02-27 08:36:55,703 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:55 +0000 (0:00:08.521) 0:00:13.923 ******* 2026-02-27 08:36:55,703 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:55 +0000 (0:00:08.521) 0:00:13.922 ******* 2026-02-27 08:36:56,486 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:56,497 p=14952 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2026-02-27 08:36:56,497 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:56 +0000 (0:00:00.793) 0:00:14.717 ******* 2026-02-27 08:36:56,497 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:56 +0000 (0:00:00.793) 0:00:14.716 ******* 2026-02-27 08:36:56,519 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:56,530 p=14952 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2026-02-27 08:36:56,531 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:56 +0000 (0:00:00.033) 0:00:14.751 ******* 2026-02-27 08:36:56,531 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:56 +0000 (0:00:00.033) 0:00:14.749 ******* 2026-02-27 08:36:57,163 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:57,170 p=14952 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2026-02-27 08:36:57,170 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.639) 0:00:15.390 ******* 2026-02-27 08:36:57,170 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.639) 0:00:15.389 ******* 2026-02-27 08:36:57,208 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:57,215 p=14952 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2026-02-27 08:36:57,215 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.044) 0:00:15.435 ******* 2026-02-27 08:36:57,215 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.044) 0:00:15.434 ******* 2026-02-27 08:36:57,246 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:57,253 p=14952 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2026-02-27 08:36:57,253 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.038) 0:00:15.474 ******* 2026-02-27 08:36:57,253 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.038) 0:00:15.472 ******* 2026-02-27 08:36:57,286 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:57,293 p=14952 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2026-02-27 08:36:57,293 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.039) 0:00:15.513 ******* 2026-02-27 08:36:57,293 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.039) 0:00:15.511 ******* 2026-02-27 08:36:57,728 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:57,735 p=14952 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-02-27 08:36:57,735 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.442) 0:00:15.956 ******* 2026-02-27 08:36:57,735 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:57 +0000 (0:00:00.442) 0:00:15.954 ******* 2026-02-27 08:36:58,331 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:58,339 p=14952 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-02-27 08:36:58,339 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.603) 0:00:16.559 ******* 2026-02-27 08:36:58,339 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.603) 0:00:16.558 ******* 2026-02-27 08:36:58,356 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,366 p=14952 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2026-02-27 08:36:58,367 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.027) 0:00:16.587 ******* 2026-02-27 08:36:58,367 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.027) 0:00:16.585 ******* 2026-02-27 08:36:58,384 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,393 p=14952 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2026-02-27 08:36:58,394 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.027) 0:00:16.614 ******* 2026-02-27 08:36:58,394 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.027) 0:00:16.612 ******* 2026-02-27 08:36:58,410 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,419 p=14952 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2026-02-27 08:36:58,420 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.025) 0:00:16.640 ******* 2026-02-27 08:36:58,420 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.025) 0:00:16.638 ******* 2026-02-27 08:36:58,454 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:58,461 p=14952 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2026-02-27 08:36:58,461 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.041) 0:00:16.681 ******* 2026-02-27 08:36:58,461 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.041) 0:00:16.679 ******* 2026-02-27 08:36:58,473 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,480 p=14952 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2026-02-27 08:36:58,480 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.019) 0:00:16.700 ******* 2026-02-27 08:36:58,480 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.019) 0:00:16.699 ******* 2026-02-27 08:36:58,493 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,502 p=14952 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2026-02-27 08:36:58,502 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.021) 0:00:16.722 ******* 2026-02-27 08:36:58,502 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.021) 0:00:16.720 ******* 2026-02-27 08:36:58,516 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,522 p=14952 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2026-02-27 08:36:58,522 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.020) 0:00:16.743 ******* 2026-02-27 08:36:58,523 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.020) 0:00:16.741 ******* 2026-02-27 08:36:58,539 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,545 p=14952 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2026-02-27 08:36:58,545 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.022) 0:00:16.765 ******* 2026-02-27 08:36:58,545 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.022) 0:00:16.764 ******* 2026-02-27 08:36:58,560 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,567 p=14952 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2026-02-27 08:36:58,567 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.021) 0:00:16.787 ******* 2026-02-27 08:36:58,567 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.021) 0:00:16.786 ******* 2026-02-27 08:36:58,578 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,586 p=14952 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2026-02-27 08:36:58,586 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.019) 0:00:16.807 ******* 2026-02-27 08:36:58,586 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.019) 0:00:16.805 ******* 2026-02-27 08:36:58,598 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:58,611 p=14952 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2026-02-27 08:36:58,611 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.024) 0:00:16.831 ******* 2026-02-27 08:36:58,611 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.024) 0:00:16.830 ******* 2026-02-27 08:36:58,804 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:36:58,818 p=14952 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2026-02-27 08:36:58,818 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.206) 0:00:17.038 ******* 2026-02-27 08:36:58,818 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:58 +0000 (0:00:00.206) 0:00:17.036 ******* 2026-02-27 08:36:58,991 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:59,001 p=14952 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2026-02-27 08:36:59,001 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.183) 0:00:17.222 ******* 2026-02-27 08:36:59,002 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.183) 0:00:17.220 ******* 2026-02-27 08:36:59,229 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:36:59,238 p=14952 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2026-02-27 08:36:59,238 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.236) 0:00:17.458 ******* 2026-02-27 08:36:59,238 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.236) 0:00:17.456 ******* 2026-02-27 08:36:59,792 p=14952 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.107:8766/gating.repo 2026-02-27 08:36:59,792 p=14952 u=zuul n=ansible | ...ignoring 2026-02-27 08:36:59,800 p=14952 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2026-02-27 08:36:59,800 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.562) 0:00:18.020 ******* 2026-02-27 08:36:59,800 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.562) 0:00:18.018 ******* 2026-02-27 08:36:59,828 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:59,835 p=14952 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2026-02-27 08:36:59,835 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.035) 0:00:18.055 ******* 2026-02-27 08:36:59,835 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.035) 0:00:18.054 ******* 2026-02-27 08:36:59,863 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:59,872 p=14952 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2026-02-27 08:36:59,872 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.036) 0:00:18.092 ******* 2026-02-27 08:36:59,872 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.036) 0:00:18.090 ******* 2026-02-27 08:36:59,899 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:59,914 p=14952 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2026-02-27 08:36:59,914 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.041) 0:00:18.134 ******* 2026-02-27 08:36:59,914 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.042) 0:00:18.132 ******* 2026-02-27 08:36:59,960 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:36:59,968 p=14952 u=zuul n=ansible | TASK [repo_setup : Lower the priority of component repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2026-02-27 08:36:59,969 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.054) 0:00:18.189 ******* 2026-02-27 08:36:59,969 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:36:59 +0000 (0:00:00.054) 0:00:18.187 ******* 2026-02-27 08:37:00,006 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:00,014 p=14952 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2026-02-27 08:37:00,014 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:00 +0000 (0:00:00.045) 0:00:18.234 ******* 2026-02-27 08:37:00,014 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:00 +0000 (0:00:00.045) 0:00:18.233 ******* 2026-02-27 08:37:00,320 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:00,327 p=14952 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2026-02-27 08:37:00,327 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:00 +0000 (0:00:00.312) 0:00:18.547 ******* 2026-02-27 08:37:00,327 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:00 +0000 (0:00:00.312) 0:00:18.545 ******* 2026-02-27 08:37:00,530 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2026-02-27 08:37:00,759 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2026-02-27 08:37:01,043 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/kubernetes.repo) 2026-02-27 08:37:01,054 p=14952 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2026-02-27 08:37:01,054 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.726) 0:00:19.274 ******* 2026-02-27 08:37:01,054 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.727) 0:00:19.272 ******* 2026-02-27 08:37:01,471 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:01,478 p=14952 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2026-02-27 08:37:01,478 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.424) 0:00:19.698 ******* 2026-02-27 08:37:01,478 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.424) 0:00:19.697 ******* 2026-02-27 08:37:01,709 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:01,721 p=14952 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2026-02-27 08:37:01,721 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.242) 0:00:19.941 ******* 2026-02-27 08:37:01,721 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.242) 0:00:19.940 ******* 2026-02-27 08:37:01,753 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2026-02-27 08:37:01,761 p=14952 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2026-02-27 08:37:01,761 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.039) 0:00:19.981 ******* 2026-02-27 08:37:01,761 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.039) 0:00:19.979 ******* 2026-02-27 08:37:01,775 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2026-02-27 08:37:01,782 p=14952 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2026-02-27 08:37:01,782 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.020) 0:00:20.002 ******* 2026-02-27 08:37:01,782 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:01 +0000 (0:00:00.020) 0:00:20.000 ******* 2026-02-27 08:37:31,986 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:31,994 p=14952 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2026-02-27 08:37:31,994 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:31 +0000 (0:00:30.211) 0:00:50.214 ******* 2026-02-27 08:37:31,994 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:31 +0000 (0:00:30.212) 0:00:50.212 ******* 2026-02-27 08:37:32,294 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:32,336 p=14952 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2026-02-27 08:37:32,336 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:32 +0000 (0:00:00.342) 0:00:50.556 ******* 2026-02-27 08:37:32,336 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:32 +0000 (0:00:00.342) 0:00:50.554 ******* 2026-02-27 08:37:32,521 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:32,531 p=14952 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2026-02-27 08:37:32,531 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:32 +0000 (0:00:00.195) 0:00:50.752 ******* 2026-02-27 08:37:32,531 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:32 +0000 (0:00:00.195) 0:00:50.750 ******* 2026-02-27 08:37:37,832 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:37,841 p=14952 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2026-02-27 08:37:37,841 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:37 +0000 (0:00:05.309) 0:00:56.062 ******* 2026-02-27 08:37:37,841 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:37 +0000 (0:00:05.309) 0:00:56.060 ******* 2026-02-27 08:37:37,872 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:37,879 p=14952 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2026-02-27 08:37:37,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:37 +0000 (0:00:00.038) 0:00:56.100 ******* 2026-02-27 08:37:37,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:37 +0000 (0:00:00.038) 0:00:56.098 ******* 2026-02-27 08:37:38,194 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:38,208 p=14952 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2026-02-27 08:37:38,208 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.328) 0:00:56.429 ******* 2026-02-27 08:37:38,208 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.328) 0:00:56.427 ******* 2026-02-27 08:37:38,511 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:38,527 p=14952 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2026-02-27 08:37:38,528 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.319) 0:00:56.748 ******* 2026-02-27 08:37:38,528 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.319) 0:00:56.746 ******* 2026-02-27 08:37:38,542 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,556 p=14952 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2026-02-27 08:37:38,557 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.029) 0:00:56.777 ******* 2026-02-27 08:37:38,557 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.029) 0:00:56.775 ******* 2026-02-27 08:37:38,571 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,583 p=14952 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2026-02-27 08:37:38,583 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.026) 0:00:56.803 ******* 2026-02-27 08:37:38,583 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.026) 0:00:56.802 ******* 2026-02-27 08:37:38,600 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,607 p=14952 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2026-02-27 08:37:38,607 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.023) 0:00:56.827 ******* 2026-02-27 08:37:38,607 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.023) 0:00:56.826 ******* 2026-02-27 08:37:38,625 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,634 p=14952 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2026-02-27 08:37:38,634 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.027) 0:00:56.855 ******* 2026-02-27 08:37:38,634 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.027) 0:00:56.853 ******* 2026-02-27 08:37:38,650 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,660 p=14952 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2026-02-27 08:37:38,660 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.025) 0:00:56.880 ******* 2026-02-27 08:37:38,660 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.025) 0:00:56.878 ******* 2026-02-27 08:37:38,680 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:38,688 p=14952 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2026-02-27 08:37:38,689 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.028) 0:00:56.909 ******* 2026-02-27 08:37:38,689 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:38 +0000 (0:00:00.028) 0:00:56.907 ******* 2026-02-27 08:37:38,947 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2026-02-27 08:37:39,135 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2026-02-27 08:37:39,347 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2026-02-27 08:37:39,556 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2026-02-27 08:37:39,741 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-02-27 08:37:39,760 p=14952 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2026-02-27 08:37:39,760 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:39 +0000 (0:00:01.071) 0:00:57.980 ******* 2026-02-27 08:37:39,760 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:39 +0000 (0:00:01.071) 0:00:57.979 ******* 2026-02-27 08:37:39,905 p=14952 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2026-02-27 08:37:39,905 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:39 +0000 (0:00:00.145) 0:00:58.125 ******* 2026-02-27 08:37:39,905 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:39 +0000 (0:00:00.145) 0:00:58.124 ******* 2026-02-27 08:37:40,119 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2026-02-27 08:37:40,312 p=14952 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2026-02-27 08:37:40,497 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-02-27 08:37:40,507 p=14952 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2026-02-27 08:37:40,507 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.601) 0:00:58.727 ******* 2026-02-27 08:37:40,507 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.601) 0:00:58.726 ******* 2026-02-27 08:37:40,540 p=14952 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2026-02-27 08:37:40,540 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.033) 0:00:58.760 ******* 2026-02-27 08:37:40,540 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.033) 0:00:58.759 ******* 2026-02-27 08:37:40,566 p=14952 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3722', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3722', 'commit_id': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'patchset': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None}) 2026-02-27 08:37:40,594 p=14952 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1823', 'change_url': 'https://github.com/openstack-k8s-operators/openstack-operator/pull/1823', 'commit_id': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'patchset': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'name': 'openstack-k8s-operators/openstack-operator', 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'topic': None}) 2026-02-27 08:37:40,603 p=14952 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2026-02-27 08:37:40,604 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.063) 0:00:58.824 ******* 2026-02-27 08:37:40,604 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.063) 0:00:58.822 ******* 2026-02-27 08:37:40,634 p=14952 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3722', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3722', 'commit_id': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'patchset': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None}) 2026-02-27 08:37:40,659 p=14952 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1823', 'change_url': 'https://github.com/openstack-k8s-operators/openstack-operator/pull/1823', 'commit_id': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'patchset': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'name': 'openstack-k8s-operators/openstack-operator', 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'topic': None}) => msg: | _repo_operator_name: openstack _repo_operator_info: [{'key': 'OPENSTACK_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/openstack-operator'}, {'key': 'OPENSTACK_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'OPENSTACK_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/openstack-operator', 'OPENSTACK_BRANCH': ''} 2026-02-27 08:37:40,680 p=14952 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2026-02-27 08:37:40,680 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.076) 0:00:58.901 ******* 2026-02-27 08:37:40,680 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.076) 0:00:58.899 ******* 2026-02-27 08:37:40,725 p=14952 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2026-02-27 08:37:40,725 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.044) 0:00:58.945 ******* 2026-02-27 08:37:40,725 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.044) 0:00:58.944 ******* 2026-02-27 08:37:40,744 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:40,752 p=14952 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2026-02-27 08:37:40,752 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.027) 0:00:58.972 ******* 2026-02-27 08:37:40,752 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.027) 0:00:58.971 ******* 2026-02-27 08:37:40,773 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:40,782 p=14952 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2026-02-27 08:37:40,782 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.030) 0:00:59.003 ******* 2026-02-27 08:37:40,783 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.030) 0:00:59.001 ******* 2026-02-27 08:37:40,813 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:40,823 p=14952 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2026-02-27 08:37:40,823 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.040) 0:00:59.043 ******* 2026-02-27 08:37:40,823 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.040) 0:00:59.042 ******* 2026-02-27 08:37:40,843 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:40,856 p=14952 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2026-02-27 08:37:40,856 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.032) 0:00:59.076 ******* 2026-02-27 08:37:40,856 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.032) 0:00:59.074 ******* 2026-02-27 08:37:40,933 p=14952 u=zuul n=ansible | ok: [localhost] => (item={'BMAAS_INSTANCE_DISK_SIZE': 60, 'OPENSTACK_BRANCH': '18.0-fr4'}) 2026-02-27 08:37:40,944 p=14952 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2026-02-27 08:37:40,945 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.088) 0:00:59.165 ******* 2026-02-27 08:37:40,945 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:40 +0000 (0:00:00.088) 0:00:59.163 ******* 2026-02-27 08:37:40,991 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:41,006 p=14952 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2026-02-27 08:37:41,007 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.061) 0:00:59.227 ******* 2026-02-27 08:37:41,007 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.062) 0:00:59.225 ******* 2026-02-27 08:37:41,757 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:41,764 p=14952 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2026-02-27 08:37:41,764 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.757) 0:00:59.985 ******* 2026-02-27 08:37:41,764 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.757) 0:00:59.983 ******* 2026-02-27 08:37:41,972 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:41,979 p=14952 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2026-02-27 08:37:41,979 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.214) 0:01:00.199 ******* 2026-02-27 08:37:41,979 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:41 +0000 (0:00:00.214) 0:01:00.197 ******* 2026-02-27 08:37:42,034 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:42,045 p=14952 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2026-02-27 08:37:42,045 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.066) 0:01:00.266 ******* 2026-02-27 08:37:42,045 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.066) 0:01:00.264 ******* 2026-02-27 08:37:42,469 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:42,476 p=14952 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2026-02-27 08:37:42,476 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.430) 0:01:00.696 ******* 2026-02-27 08:37:42,476 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.430) 0:01:00.694 ******* 2026-02-27 08:37:42,503 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:42,511 p=14952 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2026-02-27 08:37:42,512 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.035) 0:01:00.732 ******* 2026-02-27 08:37:42,512 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.035) 0:01:00.730 ******* 2026-02-27 08:37:42,527 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' OPENSTACK_BRANCH: '' OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2026-02-27 08:37:42,536 p=14952 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2026-02-27 08:37:42,536 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.024) 0:01:00.756 ******* 2026-02-27 08:37:42,536 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.024) 0:01:00.754 ******* 2026-02-27 08:37:42,565 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: 60 BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BASEURI: https://tarballs.opendev.org/openstack/ironic-python-agent/dib BMO_IPA_BRANCH: stable/2024.1 BMO_IPA_FLAVOR: centos9 BMO_IPA_INSECURE: 'false' BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: '' BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: 'true' INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '1234567842' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' MIRROR_INSECURE: 'true' MIRROR_NAMESPACE: openstack-mirror MIRROR_REGISTRY_HOST: default-route-openshift-image-registry.apps-crc.testing NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: '' OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12345678' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: osp-secret SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_USER:' 2026-02-27 08:37:42,574 p=14952 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2026-02-27 08:37:42,574 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.038) 0:01:00.795 ******* 2026-02-27 08:37:42,574 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.038) 0:01:00.793 ******* 2026-02-27 08:37:42,894 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:42,903 p=14952 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2026-02-27 08:37:42,904 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.329) 0:01:01.124 ******* 2026-02-27 08:37:42,904 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.329) 0:01:01.122 ******* 2026-02-27 08:37:42,928 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - mirror_registry - mirror_registry_secure - mirror_registry_ca - mirror_registry_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_prep - openstack_kuttl_run - openstack_kuttl_cleanup - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2026-02-27 08:37:42,940 p=14952 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2026-02-27 08:37:42,940 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.036) 0:01:01.161 ******* 2026-02-27 08:37:42,940 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:42 +0000 (0:00:00.036) 0:01:01.159 ******* 2026-02-27 08:37:43,414 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:43,425 p=14952 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2026-02-27 08:37:43,425 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:43 +0000 (0:00:00.484) 0:01:01.645 ******* 2026-02-27 08:37:43,425 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:43 +0000 (0:00:00.484) 0:01:01.643 ******* 2026-02-27 08:37:43,446 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:43,462 p=14952 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2026-02-27 08:37:43,462 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:43 +0000 (0:00:00.037) 0:01:01.682 ******* 2026-02-27 08:37:43,462 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:43 +0000 (0:00:00.037) 0:01:01.681 ******* 2026-02-27 08:37:44,280 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:44,288 p=14952 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2026-02-27 08:37:44,288 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.825) 0:01:02.508 ******* 2026-02-27 08:37:44,288 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.825) 0:01:02.506 ******* 2026-02-27 08:37:44,320 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:44,334 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2026-02-27 08:37:44,334 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.046) 0:01:02.554 ******* 2026-02-27 08:37:44,334 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.046) 0:01:02.552 ******* 2026-02-27 08:37:44,752 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:37:44,765 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:37:44,765 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.431) 0:01:02.985 ******* 2026-02-27 08:37:44,765 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.431) 0:01:02.984 ******* 2026-02-27 08:37:44,828 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:44,837 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:37:44,837 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.071) 0:01:03.057 ******* 2026-02-27 08:37:44,837 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.071) 0:01:03.055 ******* 2026-02-27 08:37:44,946 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:44,955 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:37:44,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.117) 0:01:03.175 ******* 2026-02-27 08:37:44,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:44 +0000 (0:00:00.117) 0:01:03.173 ******* 2026-02-27 08:37:45,122 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2026-02-27 08:37:45,132 p=14952 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-02-27 08:37:45,132 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.177) 0:01:03.353 ******* 2026-02-27 08:37:45,132 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.177) 0:01:03.351 ******* 2026-02-27 08:37:45,177 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:45,185 p=14952 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-02-27 08:37:45,186 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.053) 0:01:03.406 ******* 2026-02-27 08:37:45,186 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.053) 0:01:03.404 ******* 2026-02-27 08:37:45,435 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:45,443 p=14952 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-02-27 08:37:45,443 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.257) 0:01:03.663 ******* 2026-02-27 08:37:45,443 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.257) 0:01:03.661 ******* 2026-02-27 08:37:45,455 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:37:45,464 p=14952 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-02-27 08:37:45,464 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.021) 0:01:03.684 ******* 2026-02-27 08:37:45,464 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.021) 0:01:03.683 ******* 2026-02-27 08:37:45,635 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:45,642 p=14952 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-02-27 08:37:45,642 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.178) 0:01:03.863 ******* 2026-02-27 08:37:45,642 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.178) 0:01:03.861 ******* 2026-02-27 08:37:45,661 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:45,670 p=14952 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-02-27 08:37:45,670 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.027) 0:01:03.891 ******* 2026-02-27 08:37:45,670 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.028) 0:01:03.889 ******* 2026-02-27 08:37:45,865 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:45,875 p=14952 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-02-27 08:37:45,875 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.205) 0:01:04.096 ******* 2026-02-27 08:37:45,875 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:45 +0000 (0:00:00.205) 0:01:04.094 ******* 2026-02-27 08:37:46,050 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:37:46,061 p=14952 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2026-02-27 08:37:46,061 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:46 +0000 (0:00:00.185) 0:01:04.281 ******* 2026-02-27 08:37:46,061 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:37:46 +0000 (0:00:00.185) 0:01:04.280 ******* 2026-02-27 08:37:46,124 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2026-02-27 08:38:30,708 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:30,719 p=14952 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2026-02-27 08:38:30,719 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:30 +0000 (0:00:44.658) 0:01:48.940 ******* 2026-02-27 08:38:30,719 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:30 +0000 (0:00:44.658) 0:01:48.938 ******* 2026-02-27 08:38:30,741 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:30,752 p=14952 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-02-27 08:38:30,752 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:30 +0000 (0:00:00.032) 0:01:48.972 ******* 2026-02-27 08:38:30,752 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:30 +0000 (0:00:00.032) 0:01:48.970 ******* 2026-02-27 08:38:30,997 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:31,006 p=14952 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-02-27 08:38:31,006 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.254) 0:01:49.227 ******* 2026-02-27 08:38:31,007 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.254) 0:01:49.225 ******* 2026-02-27 08:38:31,023 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,065 p=14952 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2026-02-27 08:38:31,087 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:38:31,087 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.080) 0:01:49.307 ******* 2026-02-27 08:38:31,087 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.080) 0:01:49.305 ******* 2026-02-27 08:38:31,149 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:31,157 p=14952 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2026-02-27 08:38:31,157 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.070) 0:01:49.377 ******* 2026-02-27 08:38:31,157 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.070) 0:01:49.376 ******* 2026-02-27 08:38:31,179 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,186 p=14952 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2026-02-27 08:38:31,186 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.029) 0:01:49.407 ******* 2026-02-27 08:38:31,187 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.029) 0:01:49.405 ******* 2026-02-27 08:38:31,210 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,244 p=14952 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2026-02-27 08:38:31,281 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:38:31,281 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.094) 0:01:49.502 ******* 2026-02-27 08:38:31,282 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.095) 0:01:49.500 ******* 2026-02-27 08:38:31,320 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:31,331 p=14952 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-02-27 08:38:31,331 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.049) 0:01:49.551 ******* 2026-02-27 08:38:31,331 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.049) 0:01:49.550 ******* 2026-02-27 08:38:31,507 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:31,519 p=14952 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2026-02-27 08:38:31,520 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.188) 0:01:49.740 ******* 2026-02-27 08:38:31,520 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.188) 0:01:49.738 ******* 2026-02-27 08:38:31,542 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,550 p=14952 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-02-27 08:38:31,551 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.031) 0:01:49.771 ******* 2026-02-27 08:38:31,551 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.031) 0:01:49.769 ******* 2026-02-27 08:38:31,571 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,581 p=14952 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2026-02-27 08:38:31,581 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.030) 0:01:49.802 ******* 2026-02-27 08:38:31,581 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.030) 0:01:49.800 ******* 2026-02-27 08:38:31,603 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,620 p=14952 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2026-02-27 08:38:31,620 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.038) 0:01:49.840 ******* 2026-02-27 08:38:31,620 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.038) 0:01:49.839 ******* 2026-02-27 08:38:31,642 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:31,652 p=14952 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2026-02-27 08:38:31,652 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.031) 0:01:49.872 ******* 2026-02-27 08:38:31,652 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.031) 0:01:49.871 ******* 2026-02-27 08:38:31,944 p=14952 u=zuul n=ansible | TASK [rhol_crc : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2026-02-27 08:38:31,945 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.292) 0:01:50.165 ******* 2026-02-27 08:38:31,945 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:31 +0000 (0:00:00.292) 0:01:50.163 ******* 2026-02-27 08:38:32,154 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2026-02-27 08:38:32,326 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2026-02-27 08:38:32,507 p=14952 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/bin) 2026-02-27 08:38:32,519 p=14952 u=zuul n=ansible | TASK [manage_secrets : Ensure directory tree exist path={{ cifmw_manage_secrets_basedir }}/secrets, state=directory, owner={{ cifmw_manage_secrets_owner }}, mode=0700] *** 2026-02-27 08:38:32,519 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.574) 0:01:50.739 ******* 2026-02-27 08:38:32,519 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.574) 0:01:50.738 ******* 2026-02-27 08:38:32,696 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:32,715 p=14952 u=zuul n=ansible | TASK [rhol_crc : Check for binary path={{ cifmw_rhol_crc_binary }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-02-27 08:38:32,715 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.196) 0:01:50.936 ******* 2026-02-27 08:38:32,716 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.196) 0:01:50.934 ******* 2026-02-27 08:38:32,903 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:32,911 p=14952 u=zuul n=ansible | TASK [rhol_crc : Get versions if binary is available _raw_params=get_versions.yml] *** 2026-02-27 08:38:32,911 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.195) 0:01:51.132 ******* 2026-02-27 08:38:32,911 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.195) 0:01:51.130 ******* 2026-02-27 08:38:32,940 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/rhol_crc/tasks/get_versions.yml for localhost 2026-02-27 08:38:32,951 p=14952 u=zuul n=ansible | TASK [rhol_crc : Get CRC binary version _raw_params={{ cifmw_rhol_crc_binary }} version] *** 2026-02-27 08:38:32,951 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.039) 0:01:51.171 ******* 2026-02-27 08:38:32,951 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:32 +0000 (0:00:00.039) 0:01:51.170 ******* 2026-02-27 08:38:33,492 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:33,506 p=14952 u=zuul n=ansible | TASK [rhol_crc : Extract versions crc_version={{ _crc_vers.stdout_lines | select('match', 'CRC') | first | regex_replace('^CRC version: ([0-9\.]+).*$', '\1') }}, crc_openshift_version={{ _crc_vers.stdout_lines | select ('match', 'OpenShift') | first | regex_replace('^OpenShift version: (.*)$', '\1') }}] *** 2026-02-27 08:38:33,507 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.555) 0:01:51.727 ******* 2026-02-27 08:38:33,507 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.555) 0:01:51.725 ******* 2026-02-27 08:38:33,535 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:33,547 p=14952 u=zuul n=ansible | TASK [rhol_crc : Output found binary location and versions msg=Found crc at {{ cifmw_rhol_crc_binary }}, with version {{ crc_version }} (wants: {{ cifmw_rhol_crc_version }}) and serving OpenShift version {{ crc_openshift_version }}.] *** 2026-02-27 08:38:33,547 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.040) 0:01:51.768 ******* 2026-02-27 08:38:33,548 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.040) 0:01:51.766 ******* 2026-02-27 08:38:33,564 p=14952 u=zuul n=ansible | ok: [localhost] => msg: 'Found crc at /usr/local/bin/crc, with version 2.48.0 (wants: 2.39.0) and serving OpenShift version 4.18.1.' 2026-02-27 08:38:33,576 p=14952 u=zuul n=ansible | TASK [rhol_crc : Get CRC VM availability command=info, uri=qemu:///system] ***** 2026-02-27 08:38:33,576 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.028) 0:01:51.797 ******* 2026-02-27 08:38:33,576 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:33 +0000 (0:00:00.028) 0:01:51.795 ******* 2026-02-27 08:38:34,014 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:34,034 p=14952 u=zuul n=ansible | TASK [rhol_crc : Set CRC status crc_bin_available={{ _crc_bin.stat.exists }}, crc_present={{ _domains is defined and 'crc' in _domains }}, crc_running={{ _domain is defined and 'crc' in _domains and _domains.crc.state == 'running' }}] *** 2026-02-27 08:38:34,035 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.458) 0:01:52.255 ******* 2026-02-27 08:38:34,035 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.458) 0:01:52.253 ******* 2026-02-27 08:38:34,063 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:34,074 p=14952 u=zuul n=ansible | TASK [rhol_crc : Fail if crc domain is already defined msg=The crc domain already exist. Set cifmw_rhol_crc_force_cleanup to true to force the cleanup. Interrupting tasks.] *** 2026-02-27 08:38:34,074 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.039) 0:01:52.295 ******* 2026-02-27 08:38:34,074 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.039) 0:01:52.293 ******* 2026-02-27 08:38:34,093 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,103 p=14952 u=zuul n=ansible | TASK [Ensure pull-secret is in place if we need to configure CRC name=manage_secrets, tasks_from=pull_secret.yml] *** 2026-02-27 08:38:34,103 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.028) 0:01:52.324 ******* 2026-02-27 08:38:34,103 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.028) 0:01:52.322 ******* 2026-02-27 08:38:34,159 p=14952 u=zuul n=ansible | TASK [manage_secrets : Assert we get needed data quiet=True, that=['cifmw_manage_secrets_pullsecret_file != None or cifmw_manage_secrets_pullsecret_content != None', 'not (cifmw_manage_secrets_pullsecret_file != None and cifmw_manage_secrets_pullsecret_content != None)'], msg=Please provide EITHER cifmw_manage_secrets_pullsecret_file OR cifmw_manage_secrets_pullsecret_content - not both. ] *** 2026-02-27 08:38:34,159 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.055) 0:01:52.379 ******* 2026-02-27 08:38:34,159 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.055) 0:01:52.378 ******* 2026-02-27 08:38:34,181 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:34,192 p=14952 u=zuul n=ansible | TASK [manage_secrets : Manage secret _raw_params=_push_secret.yml] ************* 2026-02-27 08:38:34,193 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.413 ******* 2026-02-27 08:38:34,193 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.411 ******* 2026-02-27 08:38:34,223 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/manage_secrets/tasks/_push_secret.yml for localhost 2026-02-27 08:38:34,237 p=14952 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_dest var=_secret_dest] ******************** 2026-02-27 08:38:34,237 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.044) 0:01:52.457 ******* 2026-02-27 08:38:34,237 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.044) 0:01:52.455 ******* 2026-02-27 08:38:34,261 p=14952 u=zuul n=ansible | ok: [localhost] => _secret_dest: /home/zuul/pull-secret.json 2026-02-27 08:38:34,270 p=14952 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_file var=_secret_file] ******************** 2026-02-27 08:38:34,270 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.491 ******* 2026-02-27 08:38:34,270 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.489 ******* 2026-02-27 08:38:34,293 p=14952 u=zuul n=ansible | ok: [localhost] => _secret_file: null 2026-02-27 08:38:34,303 p=14952 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_content var=_secret_content] ************** 2026-02-27 08:38:34,304 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.524 ******* 2026-02-27 08:38:34,304 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.033) 0:01:52.522 ******* 2026-02-27 08:38:34,323 p=14952 u=zuul n=ansible | ok: [localhost] => _secret_content: {} 2026-02-27 08:38:34,335 p=14952 u=zuul n=ansible | TASK [manage_secrets : Ensure parameter is an absolute path that=['_secret_file is ansible.builtin.abs'], msg={{ _secret_file }} must be an absolute path ] *** 2026-02-27 08:38:34,335 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.556 ******* 2026-02-27 08:38:34,335 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.554 ******* 2026-02-27 08:38:34,353 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,366 p=14952 u=zuul n=ansible | TASK [manage_secrets : Check if pull secret src file exists path={{ _secret_file }}] *** 2026-02-27 08:38:34,366 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.587 ******* 2026-02-27 08:38:34,367 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.585 ******* 2026-02-27 08:38:34,382 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,393 p=14952 u=zuul n=ansible | TASK [manage_secrets : Copy file to location remote_src={{ _ps_exists.stat.exists | default(false) }}, dest={{ _secret_dest }}, src={{ _secret_file }}, mode=0600, owner={{ cifmw_manage_secrets_owner }}] *** 2026-02-27 08:38:34,393 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.026) 0:01:52.613 ******* 2026-02-27 08:38:34,393 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.026) 0:01:52.612 ******* 2026-02-27 08:38:34,407 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,416 p=14952 u=zuul n=ansible | TASK [manage_secrets : Create file from content] ******************************* 2026-02-27 08:38:34,416 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.023) 0:01:52.636 ******* 2026-02-27 08:38:34,416 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.023) 0:01:52.635 ******* 2026-02-27 08:38:34,438 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,453 p=14952 u=zuul n=ansible | TASK [rhol_crc : Get wanted RHOL/CRC version binary if needed _raw_params=binary.yml] *** 2026-02-27 08:38:34,453 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.037) 0:01:52.674 ******* 2026-02-27 08:38:34,454 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.037) 0:01:52.672 ******* 2026-02-27 08:38:34,469 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,476 p=14952 u=zuul n=ansible | TASK [rhol_crc : Setup sudoers file for sudo commands in RHOL/CRC setup _raw_params=sudoers_grant.yml] *** 2026-02-27 08:38:34,477 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.023) 0:01:52.697 ******* 2026-02-27 08:38:34,477 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.023) 0:01:52.695 ******* 2026-02-27 08:38:34,495 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,503 p=14952 u=zuul n=ansible | TASK [rhol_crc : Clean RHOL/CRC if wanted _raw_params=cleanup.yml] ************* 2026-02-27 08:38:34,503 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.026) 0:01:52.724 ******* 2026-02-27 08:38:34,503 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.026) 0:01:52.722 ******* 2026-02-27 08:38:34,524 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,536 p=14952 u=zuul n=ansible | TASK [rhol_crc : Set RHOL/CRC configuration options _raw_params=configuration.yml] *** 2026-02-27 08:38:34,536 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.032) 0:01:52.756 ******* 2026-02-27 08:38:34,536 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.032) 0:01:52.754 ******* 2026-02-27 08:38:34,557 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,567 p=14952 u=zuul n=ansible | TASK [rhol_crc : Setup RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} setup 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-setup.log] *** 2026-02-27 08:38:34,567 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.787 ******* 2026-02-27 08:38:34,567 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.031) 0:01:52.786 ******* 2026-02-27 08:38:34,586 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:34,596 p=14952 u=zuul n=ansible | TASK [rhol_crc : Start RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} start 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-start.log] *** 2026-02-27 08:38:34,596 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.028) 0:01:52.816 ******* 2026-02-27 08:38:34,596 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:34 +0000 (0:00:00.028) 0:01:52.814 ******* 2026-02-27 08:38:35,258 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:35,267 p=14952 u=zuul n=ansible | TASK [rhol_crc : List VMs command=list_vms] ************************************ 2026-02-27 08:38:35,267 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.671) 0:01:53.487 ******* 2026-02-27 08:38:35,267 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.671) 0:01:53.486 ******* 2026-02-27 08:38:35,479 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:35,490 p=14952 u=zuul n=ansible | TASK [rhol_crc : Output VMs var=_vm_list] ************************************** 2026-02-27 08:38:35,490 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.223) 0:01:53.711 ******* 2026-02-27 08:38:35,490 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.223) 0:01:53.709 ******* 2026-02-27 08:38:35,514 p=14952 u=zuul n=ansible | ok: [localhost] => _vm_list: changed: false failed: false list_vms: - crc 2026-02-27 08:38:35,523 p=14952 u=zuul n=ansible | TASK [rhol_crc : List networks command=list_nets] ****************************** 2026-02-27 08:38:35,524 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.033) 0:01:53.744 ******* 2026-02-27 08:38:35,524 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.033) 0:01:53.742 ******* 2026-02-27 08:38:35,923 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:35,933 p=14952 u=zuul n=ansible | TASK [rhol_crc : Output networks var=_net_list] ******************************** 2026-02-27 08:38:35,934 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.410) 0:01:54.154 ******* 2026-02-27 08:38:35,934 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.410) 0:01:54.152 ******* 2026-02-27 08:38:35,958 p=14952 u=zuul n=ansible | ok: [localhost] => _net_list: changed: false failed: false list_nets: - crc - default 2026-02-27 08:38:35,968 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Get virtual network information command=info, uri=qemu:///system] *** 2026-02-27 08:38:35,968 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.034) 0:01:54.189 ******* 2026-02-27 08:38:35,968 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:35 +0000 (0:00:00.034) 0:01:54.187 ******* 2026-02-27 08:38:36,242 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:36,252 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Create network to bridge mapping _net_bridge_map={{ _net_bridge_map | default({}) | combine(_local_map, recursive=true) }}] *** 2026-02-27 08:38:36,252 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:36 +0000 (0:00:00.283) 0:01:54.473 ******* 2026-02-27 08:38:36,252 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:36 +0000 (0:00:00.284) 0:01:54.471 ******* 2026-02-27 08:38:36,286 p=14952 u=zuul n=ansible | ok: [localhost] => (item=crc) 2026-02-27 08:38:36,289 p=14952 u=zuul n=ansible | ok: [localhost] => (item=default) 2026-02-27 08:38:36,301 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Dump domain xml command=get_xml, name={{ vm_name }}, uri=qemu:///system] *** 2026-02-27 08:38:36,302 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:36 +0000 (0:00:00.049) 0:01:54.522 ******* 2026-02-27 08:38:36,302 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:36 +0000 (0:00:00.049) 0:01:54.520 ******* 2026-02-27 08:38:37,568 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:37,577 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Extract networks from XML xmlstring={{ _domain_xml.get_xml }}, xpath=/domain/devices/interface/source, content=attribute] *** 2026-02-27 08:38:37,577 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:37 +0000 (0:00:01.275) 0:01:55.797 ******* 2026-02-27 08:38:37,577 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:37 +0000 (0:00:01.275) 0:01:55.796 ******* 2026-02-27 08:38:38,014 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:38,024 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Attach interface default on crc _raw_params=virsh -c qemu:///system attach-interface "{{ vm_name }}" --source "{{ _local_bridge_name }}" --type "{{ _type }}" --mac "{{ _lm_mac_address }}" --model virtio --config --persistent] *** 2026-02-27 08:38:38,024 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.447) 0:01:56.244 ******* 2026-02-27 08:38:38,024 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.447) 0:01:56.243 ******* 2026-02-27 08:38:38,374 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:38,392 p=14952 u=zuul n=ansible | TASK [rhol_crc : Revoke permissions granted in sudoers file for CRC/RHOL setup name={{ cifmw_rhol_crc_sudoers_file_name }}, state=absent] *** 2026-02-27 08:38:38,392 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.368) 0:01:56.613 ******* 2026-02-27 08:38:38,392 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.368) 0:01:56.611 ******* 2026-02-27 08:38:38,817 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:38,827 p=14952 u=zuul n=ansible | TASK [openshift_login : Assert we have needed parameters that=['cifmw_openshift_login_load_kubeconfig is defined', 'cifmw_openshift_login_load_kubeconfig is not none', 'cifmw_openshift_login_load_kubeadmin is defined', 'cifmw_openshift_login_load_kubeadmin is not none']] *** 2026-02-27 08:38:38,827 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.434) 0:01:57.048 ******* 2026-02-27 08:38:38,827 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.434) 0:01:57.046 ******* 2026-02-27 08:38:38,877 p=14952 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-02-27 08:38:38,887 p=14952 u=zuul n=ansible | TASK [openshift_login : Stat kubeconfig path={{ cifmw_openshift_login_load_kubeconfig }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-02-27 08:38:38,887 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.059) 0:01:57.107 ******* 2026-02-27 08:38:38,887 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:38 +0000 (0:00:00.059) 0:01:57.106 ******* 2026-02-27 08:38:39,080 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:39,094 p=14952 u=zuul n=ansible | TASK [openshift_login : Stat kubeadmin path={{ cifmw_openshift_login_load_kubeadmin }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-02-27 08:38:39,094 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.206) 0:01:57.314 ******* 2026-02-27 08:38:39,094 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.206) 0:01:57.312 ******* 2026-02-27 08:38:39,279 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:39,289 p=14952 u=zuul n=ansible | TASK [openshift_login : Assert files exist that=['_stat_config.stat.exists', '_stat_admin.stat.exists']] *** 2026-02-27 08:38:39,289 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.195) 0:01:57.510 ******* 2026-02-27 08:38:39,289 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.195) 0:01:57.508 ******* 2026-02-27 08:38:39,310 p=14952 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-02-27 08:38:39,323 p=14952 u=zuul n=ansible | TASK [openshift_login : Gather the password of the deployed cluster. src={{ cifmw_openshift_login_load_kubeadmin }}] *** 2026-02-27 08:38:39,323 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.033) 0:01:57.543 ******* 2026-02-27 08:38:39,323 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.033) 0:01:57.542 ******* 2026-02-27 08:38:39,619 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:39,629 p=14952 u=zuul n=ansible | TASK [openshift_login : Gather the deployed OCP configuration. path={{ cifmw_openshift_login_load_kubeconfig }}] *** 2026-02-27 08:38:39,630 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.306) 0:01:57.850 ******* 2026-02-27 08:38:39,630 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.306) 0:01:57.848 ******* 2026-02-27 08:38:39,827 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:39,839 p=14952 u=zuul n=ansible | TASK [openshift_login : Set the OpenShift platform access information. cifmw_openshift_api={{ kubeconf.clusters[0].cluster.server }}, cifmw_openshift_user=kubeadmin, cifmw_openshift_password={{ kubeadmin_password.content | b64decode }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_load_kubeconfig }}, cacheable=True] *** 2026-02-27 08:38:39,839 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.209) 0:01:58.060 ******* 2026-02-27 08:38:39,839 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.209) 0:01:58.058 ******* 2026-02-27 08:38:39,866 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:39,885 p=14952 u=zuul n=ansible | TASK [rhol_crc : Make sure kubeconfig file exists path={{ cifmw_rhol_crc_kubeconfig }}] *** 2026-02-27 08:38:39,886 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.046) 0:01:58.106 ******* 2026-02-27 08:38:39,886 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.046) 0:01:58.104 ******* 2026-02-27 08:38:39,901 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:39,911 p=14952 u=zuul n=ansible | TASK [rhol_crc : Warn the user that the kubeconfig files doesn't exist msg=The kubeconfig file was not found at {{ cifmw_rhol_crc_kubeconfig }}.] *** 2026-02-27 08:38:39,912 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.132 ******* 2026-02-27 08:38:39,912 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.130 ******* 2026-02-27 08:38:39,927 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:39,939 p=14952 u=zuul n=ansible | TASK [rhol_crc : Add crc creds in the user bashrc file dest=~/.bashrc, create=True, block=if command -v crc; then eval "$(crc oc-env --shell bash)" fi export KUBECONFIG="{{ cifmw_rhol_crc_kubeconfig }}", mode=0644] *** 2026-02-27 08:38:39,939 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.027) 0:01:58.159 ******* 2026-02-27 08:38:39,939 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.027) 0:01:58.158 ******* 2026-02-27 08:38:39,958 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:39,966 p=14952 u=zuul n=ansible | TASK [rhol_crc : Source bashrc and confirm crc login executable=/bin/bash, _raw_params=source ~/.bashrc oc whoami ] *** 2026-02-27 08:38:39,966 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.186 ******* 2026-02-27 08:38:39,966 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.185 ******* 2026-02-27 08:38:39,982 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:39,993 p=14952 u=zuul n=ansible | TASK [rhol_crc : Check bashrc results var=bashrc_result.stdout] **************** 2026-02-27 08:38:39,993 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.213 ******* 2026-02-27 08:38:39,993 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:39 +0000 (0:00:00.026) 0:01:58.211 ******* 2026-02-27 08:38:40,008 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:40,016 p=14952 u=zuul n=ansible | TASK [rhol_crc : Check if using systemd dnsmasq path={{ _dnsmasq_config }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-02-27 08:38:40,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:40 +0000 (0:00:00.023) 0:01:58.236 ******* 2026-02-27 08:38:40,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:40 +0000 (0:00:00.023) 0:01:58.234 ******* 2026-02-27 08:38:42,154 p=14952 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2026-02-27 08:38:42,154 p=14952 u=zuul n=ansible | ok: [localhost -> crc(api.crc.testing)] 2026-02-27 08:38:42,162 p=14952 u=zuul n=ansible | TASK [rhol_crc : Configure dnsmasq listen-address to listen on both br-ex and ospbr path={{ _dnsmasq_config }}, insertafter=^listen-address=, line=listen-address={{ _crc_ip | ansible.utils.ipaddr('address') }}] *** 2026-02-27 08:38:42,162 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:42 +0000 (0:00:02.146) 0:02:00.383 ******* 2026-02-27 08:38:42,162 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:42 +0000 (0:00:02.146) 0:02:00.381 ******* 2026-02-27 08:38:43,085 p=14952 u=zuul n=ansible | [WARNING]: Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually 2026-02-27 08:38:43,085 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2026-02-27 08:38:43,095 p=14952 u=zuul n=ansible | TASK [rhol_crc : Restart DNS in CRC VM name=dnsmasq, state=restarted] ********** 2026-02-27 08:38:43,095 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:43 +0000 (0:00:00.932) 0:02:01.315 ******* 2026-02-27 08:38:43,095 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:43 +0000 (0:00:00.932) 0:02:01.314 ******* 2026-02-27 08:38:45,036 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2026-02-27 08:38:45,053 p=14952 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2026-02-27 08:38:45,053 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:01.958) 0:02:03.273 ******* 2026-02-27 08:38:45,053 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:01.958) 0:02:03.272 ******* 2026-02-27 08:38:45,077 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,090 p=14952 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2026-02-27 08:38:45,090 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.037) 0:02:03.311 ******* 2026-02-27 08:38:45,090 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.037) 0:02:03.309 ******* 2026-02-27 08:38:45,420 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:45,433 p=14952 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2026-02-27 08:38:45,433 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.342) 0:02:03.653 ******* 2026-02-27 08:38:45,433 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.342) 0:02:03.652 ******* 2026-02-27 08:38:45,466 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2026-02-27 08:38:45,480 p=14952 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-02-27 08:38:45,481 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.047) 0:02:03.701 ******* 2026-02-27 08:38:45,481 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.047) 0:02:03.699 ******* 2026-02-27 08:38:45,507 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,524 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-02-27 08:38:45,524 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.043) 0:02:03.744 ******* 2026-02-27 08:38:45,524 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.043) 0:02:03.742 ******* 2026-02-27 08:38:45,551 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,563 p=14952 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2026-02-27 08:38:45,564 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.039) 0:02:03.784 ******* 2026-02-27 08:38:45,564 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.039) 0:02:03.782 ******* 2026-02-27 08:38:45,587 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,598 p=14952 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2026-02-27 08:38:45,598 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.034) 0:02:03.818 ******* 2026-02-27 08:38:45,598 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.034) 0:02:03.817 ******* 2026-02-27 08:38:45,636 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:45,645 p=14952 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2026-02-27 08:38:45,645 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.047) 0:02:03.866 ******* 2026-02-27 08:38:45,645 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.047) 0:02:03.864 ******* 2026-02-27 08:38:45,868 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:45,882 p=14952 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2026-02-27 08:38:45,883 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.237) 0:02:04.103 ******* 2026-02-27 08:38:45,883 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.237) 0:02:04.101 ******* 2026-02-27 08:38:45,910 p=14952 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-02-27 08:38:45,919 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2026-02-27 08:38:45,920 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.036) 0:02:04.140 ******* 2026-02-27 08:38:45,920 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.036) 0:02:04.138 ******* 2026-02-27 08:38:45,942 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,951 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2026-02-27 08:38:45,952 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.032) 0:02:04.172 ******* 2026-02-27 08:38:45,952 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.032) 0:02:04.170 ******* 2026-02-27 08:38:45,972 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:45,982 p=14952 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2026-02-27 08:38:45,983 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.031) 0:02:04.203 ******* 2026-02-27 08:38:45,983 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:45 +0000 (0:00:00.031) 0:02:04.201 ******* 2026-02-27 08:38:46,005 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:46,016 p=14952 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2026-02-27 08:38:46,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.033) 0:02:04.236 ******* 2026-02-27 08:38:46,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.033) 0:02:04.235 ******* 2026-02-27 08:38:46,044 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:46,053 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2026-02-27 08:38:46,053 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.037) 0:02:04.273 ******* 2026-02-27 08:38:46,053 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.037) 0:02:04.272 ******* 2026-02-27 08:38:46,074 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2026-02-27 08:38:46,089 p=14952 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2026-02-27 08:38:46,089 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.036) 0:02:04.310 ******* 2026-02-27 08:38:46,089 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.036) 0:02:04.308 ******* 2026-02-27 08:38:46,105 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:46,113 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2026-02-27 08:38:46,113 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.023) 0:02:04.333 ******* 2026-02-27 08:38:46,113 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:46 +0000 (0:00:00.023) 0:02:04.332 ******* 2026-02-27 08:38:46,165 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2026-02-27 08:38:47,451 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:47,462 p=14952 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2026-02-27 08:38:47,462 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:01.348) 0:02:05.682 ******* 2026-02-27 08:38:47,462 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:01.348) 0:02:05.680 ******* 2026-02-27 08:38:47,486 p=14952 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-02-27 08:38:47,495 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2026-02-27 08:38:47,495 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.033) 0:02:05.716 ******* 2026-02-27 08:38:47,495 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.033) 0:02:05.714 ******* 2026-02-27 08:38:47,823 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:47,832 p=14952 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2026-02-27 08:38:47,832 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.336) 0:02:06.053 ******* 2026-02-27 08:38:47,832 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.336) 0:02:06.051 ******* 2026-02-27 08:38:47,864 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:47,878 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2026-02-27 08:38:47,879 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.046) 0:02:06.099 ******* 2026-02-27 08:38:47,879 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:47 +0000 (0:00:00.046) 0:02:06.097 ******* 2026-02-27 08:38:48,318 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:48,329 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2026-02-27 08:38:48,329 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:48 +0000 (0:00:00.450) 0:02:06.550 ******* 2026-02-27 08:38:48,329 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:48 +0000 (0:00:00.450) 0:02:06.548 ******* 2026-02-27 08:38:48,667 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:48,677 p=14952 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2026-02-27 08:38:48,677 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:48 +0000 (0:00:00.347) 0:02:06.898 ******* 2026-02-27 08:38:48,677 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:48 +0000 (0:00:00.347) 0:02:06.896 ******* 2026-02-27 08:38:48,991 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:49,001 p=14952 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2026-02-27 08:38:49,001 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.323) 0:02:07.221 ******* 2026-02-27 08:38:49,001 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.323) 0:02:07.220 ******* 2026-02-27 08:38:49,037 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:49,047 p=14952 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2026-02-27 08:38:49,048 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.046) 0:02:07.268 ******* 2026-02-27 08:38:49,048 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.046) 0:02:07.266 ******* 2026-02-27 08:38:49,445 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:49,453 p=14952 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml] *** 2026-02-27 08:38:49,453 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.405) 0:02:07.673 ******* 2026-02-27 08:38:49,453 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.405) 0:02:07.672 ******* 2026-02-27 08:38:49,659 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:49,668 p=14952 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2026-02-27 08:38:49,668 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.214) 0:02:07.888 ******* 2026-02-27 08:38:49,668 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:49 +0000 (0:00:00.214) 0:02:07.886 ******* 2026-02-27 08:38:50,136 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:50,152 p=14952 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2026-02-27 08:38:50,152 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.484) 0:02:08.372 ******* 2026-02-27 08:38:50,152 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.484) 0:02:08.371 ******* 2026-02-27 08:38:50,351 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:50,361 p=14952 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2026-02-27 08:38:50,361 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.209) 0:02:08.582 ******* 2026-02-27 08:38:50,361 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.209) 0:02:08.580 ******* 2026-02-27 08:38:50,389 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:50,402 p=14952 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2026-02-27 08:38:50,402 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.040) 0:02:08.622 ******* 2026-02-27 08:38:50,402 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:50 +0000 (0:00:00.040) 0:02:08.620 ******* 2026-02-27 08:38:51,407 p=14952 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2026-02-27 08:38:52,150 p=14952 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2026-02-27 08:38:52,164 p=14952 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2026-02-27 08:38:52,164 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:01.761) 0:02:10.384 ******* 2026-02-27 08:38:52,164 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:01.761) 0:02:10.382 ******* 2026-02-27 08:38:52,179 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,189 p=14952 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2026-02-27 08:38:52,189 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.025) 0:02:10.409 ******* 2026-02-27 08:38:52,189 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.025) 0:02:10.408 ******* 2026-02-27 08:38:52,213 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2026-02-27 08:38:52,214 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2026-02-27 08:38:52,215 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,226 p=14952 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2026-02-27 08:38:52,226 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.037) 0:02:10.447 ******* 2026-02-27 08:38:52,226 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.037) 0:02:10.445 ******* 2026-02-27 08:38:52,262 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,272 p=14952 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2026-02-27 08:38:52,272 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.046) 0:02:10.493 ******* 2026-02-27 08:38:52,273 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.046) 0:02:10.491 ******* 2026-02-27 08:38:52,291 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,300 p=14952 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2026-02-27 08:38:52,300 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.027) 0:02:10.521 ******* 2026-02-27 08:38:52,301 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.028) 0:02:10.519 ******* 2026-02-27 08:38:52,321 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,330 p=14952 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2026-02-27 08:38:52,330 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.029) 0:02:10.550 ******* 2026-02-27 08:38:52,330 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.029) 0:02:10.549 ******* 2026-02-27 08:38:52,348 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,355 p=14952 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2026-02-27 08:38:52,355 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.025) 0:02:10.575 ******* 2026-02-27 08:38:52,355 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.025) 0:02:10.574 ******* 2026-02-27 08:38:52,377 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,386 p=14952 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2026-02-27 08:38:52,386 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.030) 0:02:10.606 ******* 2026-02-27 08:38:52,386 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.030) 0:02:10.604 ******* 2026-02-27 08:38:52,419 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,427 p=14952 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2026-02-27 08:38:52,428 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.041) 0:02:10.648 ******* 2026-02-27 08:38:52,428 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.041) 0:02:10.646 ******* 2026-02-27 08:38:52,448 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,456 p=14952 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2026-02-27 08:38:52,457 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.029) 0:02:10.677 ******* 2026-02-27 08:38:52,457 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.029) 0:02:10.675 ******* 2026-02-27 08:38:52,481 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,490 p=14952 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2026-02-27 08:38:52,491 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.033) 0:02:10.711 ******* 2026-02-27 08:38:52,491 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.033) 0:02:10.709 ******* 2026-02-27 08:38:52,517 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:52,526 p=14952 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2026-02-27 08:38:52,526 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.035) 0:02:10.746 ******* 2026-02-27 08:38:52,526 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:52 +0000 (0:00:00.035) 0:02:10.744 ******* 2026-02-27 08:38:53,434 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:38:53,449 p=14952 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2026-02-27 08:38:53,449 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:53 +0000 (0:00:00.923) 0:02:11.670 ******* 2026-02-27 08:38:53,450 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:53 +0000 (0:00:00.923) 0:02:11.668 ******* 2026-02-27 08:38:54,729 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:54,741 p=14952 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': '{{ cifmw_openshift_setup_samples_registry }}'}]] *** 2026-02-27 08:38:54,741 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:54 +0000 (0:00:01.291) 0:02:12.961 ******* 2026-02-27 08:38:54,741 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:54 +0000 (0:00:01.291) 0:02:12.959 ******* 2026-02-27 08:38:55,640 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:55,649 p=14952 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2026-02-27 08:38:55,649 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.908) 0:02:13.869 ******* 2026-02-27 08:38:55,649 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.908) 0:02:13.868 ******* 2026-02-27 08:38:55,667 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:55,679 p=14952 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2026-02-27 08:38:55,679 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.030) 0:02:13.900 ******* 2026-02-27 08:38:55,679 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.030) 0:02:13.898 ******* 2026-02-27 08:38:55,697 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:55,715 p=14952 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2026-02-27 08:38:55,715 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.035) 0:02:13.935 ******* 2026-02-27 08:38:55,715 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.035) 0:02:13.933 ******* 2026-02-27 08:38:55,740 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:55,748 p=14952 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2026-02-27 08:38:55,748 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.033) 0:02:13.969 ******* 2026-02-27 08:38:55,748 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.033) 0:02:13.967 ******* 2026-02-27 08:38:55,770 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:38:55,781 p=14952 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2026-02-27 08:38:55,782 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.033) 0:02:14.002 ******* 2026-02-27 08:38:55,782 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.033) 0:02:14.000 ******* 2026-02-27 08:38:55,953 p=14952 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2026-02-27 08:38:55,953 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.171) 0:02:14.173 ******* 2026-02-27 08:38:55,953 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:55 +0000 (0:00:00.171) 0:02:14.172 ******* 2026-02-27 08:38:56,163 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:56,173 p=14952 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2026-02-27 08:38:56,173 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:56 +0000 (0:00:00.219) 0:02:14.393 ******* 2026-02-27 08:38:56,173 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:56 +0000 (0:00:00.219) 0:02:14.392 ******* 2026-02-27 08:38:56,941 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:56,954 p=14952 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2026-02-27 08:38:56,954 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:56 +0000 (0:00:00.780) 0:02:15.174 ******* 2026-02-27 08:38:56,954 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:56 +0000 (0:00:00.780) 0:02:15.172 ******* 2026-02-27 08:38:56,988 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2026-02-27 08:38:57,008 p=14952 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2026-02-27 08:38:57,008 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:57 +0000 (0:00:00.053) 0:02:15.228 ******* 2026-02-27 08:38:57,008 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:57 +0000 (0:00:00.053) 0:02:15.226 ******* 2026-02-27 08:38:57,705 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:38:57,718 p=14952 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2026-02-27 08:38:57,718 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:57 +0000 (0:00:00.709) 0:02:15.938 ******* 2026-02-27 08:38:57,718 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:38:57 +0000 (0:00:00.710) 0:02:15.936 ******* 2026-02-27 08:39:02,644 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:02,705 p=14952 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2026-02-27 08:39:02,705 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:02 +0000 (0:00:04.987) 0:02:20.925 ******* 2026-02-27 08:39:02,705 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:02 +0000 (0:00:04.987) 0:02:20.924 ******* 2026-02-27 08:39:02,721 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:02,737 p=14952 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2026-02-27 08:39:02,737 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:02 +0000 (0:00:00.031) 0:02:20.957 ******* 2026-02-27 08:39:02,737 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:02 +0000 (0:00:00.031) 0:02:20.955 ******* 2026-02-27 08:39:03,522 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:03,532 p=14952 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2026-02-27 08:39:03,533 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:03 +0000 (0:00:00.795) 0:02:21.753 ******* 2026-02-27 08:39:03,533 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:03 +0000 (0:00:00.795) 0:02:21.751 ******* 2026-02-27 08:39:14,275 p=14952 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2026-02-27 08:39:25,035 p=14952 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2026-02-27 08:39:26,227 p=14952 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2026-02-27 08:39:26,247 p=14952 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2026-02-27 08:39:26,247 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:26 +0000 (0:00:22.714) 0:02:44.467 ******* 2026-02-27 08:39:26,247 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:26 +0000 (0:00:22.714) 0:02:44.466 ******* 2026-02-27 08:39:26,469 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:26,482 p=14952 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2026-02-27 08:39:26,482 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:26 +0000 (0:00:00.234) 0:02:44.702 ******* 2026-02-27 08:39:26,482 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:26 +0000 (0:00:00.234) 0:02:44.701 ******* 2026-02-27 08:39:27,559 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:27,568 p=14952 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2026-02-27 08:39:27,568 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:01.086) 0:02:45.789 ******* 2026-02-27 08:39:27,569 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:01.086) 0:02:45.787 ******* 2026-02-27 08:39:27,911 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:27,925 p=14952 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2026-02-27 08:39:27,925 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.356) 0:02:46.145 ******* 2026-02-27 08:39:27,925 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.356) 0:02:46.144 ******* 2026-02-27 08:39:27,943 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:27,954 p=14952 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2026-02-27 08:39:27,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.029) 0:02:46.175 ******* 2026-02-27 08:39:27,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.029) 0:02:46.173 ******* 2026-02-27 08:39:27,972 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:27,983 p=14952 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2026-02-27 08:39:27,984 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.029) 0:02:46.204 ******* 2026-02-27 08:39:27,984 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:27 +0000 (0:00:00.029) 0:02:46.202 ******* 2026-02-27 08:39:28,005 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,014 p=14952 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2026-02-27 08:39:28,014 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.030) 0:02:46.235 ******* 2026-02-27 08:39:28,015 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.030) 0:02:46.233 ******* 2026-02-27 08:39:28,037 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,047 p=14952 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2026-02-27 08:39:28,047 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.032) 0:02:46.267 ******* 2026-02-27 08:39:28,047 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.032) 0:02:46.265 ******* 2026-02-27 08:39:28,073 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,084 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:28,084 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.037) 0:02:46.304 ******* 2026-02-27 08:39:28,084 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.037) 0:02:46.303 ******* 2026-02-27 08:39:28,140 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,151 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:28,151 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.066) 0:02:46.371 ******* 2026-02-27 08:39:28,151 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.067) 0:02:46.370 ******* 2026-02-27 08:39:28,238 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,247 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:28,247 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.095) 0:02:46.467 ******* 2026-02-27 08:39:28,247 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.095) 0:02:46.466 ******* 2026-02-27 08:39:28,326 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,347 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:28,347 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.099) 0:02:46.567 ******* 2026-02-27 08:39:28,347 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.099) 0:02:46.566 ******* 2026-02-27 08:39:28,420 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,432 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:28,432 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.085) 0:02:46.653 ******* 2026-02-27 08:39:28,432 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.085) 0:02:46.651 ******* 2026-02-27 08:39:28,507 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,516 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:28,516 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.084) 0:02:46.737 ******* 2026-02-27 08:39:28,516 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.084) 0:02:46.735 ******* 2026-02-27 08:39:28,604 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,619 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:39:28,620 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.103) 0:02:46.840 ******* 2026-02-27 08:39:28,620 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.103) 0:02:46.838 ******* 2026-02-27 08:39:28,764 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,776 p=14952 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2026-02-27 08:39:28,776 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.156) 0:02:46.996 ******* 2026-02-27 08:39:28,776 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.156) 0:02:46.994 ******* 2026-02-27 08:39:28,803 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,812 p=14952 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2026-02-27 08:39:28,812 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.036) 0:02:47.033 ******* 2026-02-27 08:39:28,813 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.036) 0:02:47.031 ******* 2026-02-27 08:39:28,833 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:28,848 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:28,848 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.035) 0:02:47.068 ******* 2026-02-27 08:39:28,848 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.035) 0:02:47.066 ******* 2026-02-27 08:39:28,904 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:28,913 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:28,914 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.065) 0:02:47.134 ******* 2026-02-27 08:39:28,914 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:28 +0000 (0:00:00.065) 0:02:47.132 ******* 2026-02-27 08:39:29,053 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,118 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:29,119 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.205) 0:02:47.339 ******* 2026-02-27 08:39:29,119 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.205) 0:02:47.337 ******* 2026-02-27 08:39:29,205 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:29,227 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:29,228 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.109) 0:02:47.448 ******* 2026-02-27 08:39:29,228 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.109) 0:02:47.446 ******* 2026-02-27 08:39:29,289 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,298 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:29,298 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.070) 0:02:47.518 ******* 2026-02-27 08:39:29,298 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.070) 0:02:47.517 ******* 2026-02-27 08:39:29,384 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,402 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:29,402 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.104) 0:02:47.623 ******* 2026-02-27 08:39:29,403 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.104) 0:02:47.621 ******* 2026-02-27 08:39:29,489 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:29,522 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:39:29,522 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.120) 0:02:47.743 ******* 2026-02-27 08:39:29,523 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.120) 0:02:47.741 ******* 2026-02-27 08:39:29,573 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,583 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2026-02-27 08:39:29,583 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.060) 0:02:47.804 ******* 2026-02-27 08:39:29,583 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.060) 0:02:47.802 ******* 2026-02-27 08:39:29,604 p=14952 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2026-02-27 08:39:29,615 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:29,616 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.032) 0:02:47.836 ******* 2026-02-27 08:39:29,616 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.032) 0:02:47.834 ******* 2026-02-27 08:39:29,675 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,684 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:29,684 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.068) 0:02:47.904 ******* 2026-02-27 08:39:29,684 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.068) 0:02:47.903 ******* 2026-02-27 08:39:29,766 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,776 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:29,777 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.092) 0:02:47.997 ******* 2026-02-27 08:39:29,777 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.092) 0:02:47.995 ******* 2026-02-27 08:39:29,862 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:29,884 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:29,884 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.107) 0:02:48.104 ******* 2026-02-27 08:39:29,884 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.107) 0:02:48.102 ******* 2026-02-27 08:39:29,961 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:29,969 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:29,969 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.085) 0:02:48.190 ******* 2026-02-27 08:39:29,970 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:29 +0000 (0:00:00.085) 0:02:48.188 ******* 2026-02-27 08:39:30,047 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:30,059 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:30,060 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.090) 0:02:48.280 ******* 2026-02-27 08:39:30,060 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.090) 0:02:48.278 ******* 2026-02-27 08:39:30,162 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,180 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:39:30,180 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.120) 0:02:48.400 ******* 2026-02-27 08:39:30,180 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.120) 0:02:48.399 ******* 2026-02-27 08:39:30,226 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:30,236 p=14952 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-02-27 08:39:30,236 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.056) 0:02:48.457 ******* 2026-02-27 08:39:30,236 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.056) 0:02:48.455 ******* 2026-02-27 08:39:30,266 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2026-02-27 08:39:30,270 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2026-02-27 08:39:30,272 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,279 p=14952 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2026-02-27 08:39:30,280 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.043) 0:02:48.500 ******* 2026-02-27 08:39:30,280 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.043) 0:02:48.498 ******* 2026-02-27 08:39:30,305 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,318 p=14952 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2026-02-27 08:39:30,318 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.038) 0:02:48.539 ******* 2026-02-27 08:39:30,319 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.038) 0:02:48.537 ******* 2026-02-27 08:39:30,349 p=14952 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3722', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3722', 'commit_id': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'patchset': '9d70f418a35867a8cfab3edfad6121f78aa7bced', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None}) 2026-02-27 08:39:30,354 p=14952 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '1823', 'change_url': 'https://github.com/openstack-k8s-operators/openstack-operator/pull/1823', 'commit_id': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'patchset': 'a42ebae1992fcedaf005662d6e1bf75431c843a7', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'name': 'openstack-k8s-operators/openstack-operator', 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'topic': None}) 2026-02-27 08:39:30,355 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,365 p=14952 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2026-02-27 08:39:30,365 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.046) 0:02:48.585 ******* 2026-02-27 08:39:30,365 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.046) 0:02:48.584 ******* 2026-02-27 08:39:30,387 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,395 p=14952 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2026-02-27 08:39:30,395 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.030) 0:02:48.616 ******* 2026-02-27 08:39:30,396 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.030) 0:02:48.614 ******* 2026-02-27 08:39:30,420 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,428 p=14952 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2026-02-27 08:39:30,428 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.032) 0:02:48.648 ******* 2026-02-27 08:39:30,428 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.032) 0:02:48.647 ******* 2026-02-27 08:39:30,451 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,463 p=14952 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2026-02-27 08:39:30,464 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.035) 0:02:48.684 ******* 2026-02-27 08:39:30,464 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.035) 0:02:48.682 ******* 2026-02-27 08:39:30,491 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,498 p=14952 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2026-02-27 08:39:30,499 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.034) 0:02:48.719 ******* 2026-02-27 08:39:30,499 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.034) 0:02:48.717 ******* 2026-02-27 08:39:30,525 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,533 p=14952 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2026-02-27 08:39:30,534 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.034) 0:02:48.754 ******* 2026-02-27 08:39:30,534 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.034) 0:02:48.752 ******* 2026-02-27 08:39:30,558 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,570 p=14952 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2026-02-27 08:39:30,570 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.036) 0:02:48.790 ******* 2026-02-27 08:39:30,570 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.036) 0:02:48.789 ******* 2026-02-27 08:39:30,600 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,618 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:30,618 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.048) 0:02:48.838 ******* 2026-02-27 08:39:30,618 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.048) 0:02:48.837 ******* 2026-02-27 08:39:30,679 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:30,688 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:30,688 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.069) 0:02:48.908 ******* 2026-02-27 08:39:30,688 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.069) 0:02:48.906 ******* 2026-02-27 08:39:30,774 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:30,786 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:30,786 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.097) 0:02:49.006 ******* 2026-02-27 08:39:30,786 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.097) 0:02:49.004 ******* 2026-02-27 08:39:30,872 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:30,894 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 08:39:30,894 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.108) 0:02:49.114 ******* 2026-02-27 08:39:30,894 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.108) 0:02:49.112 ******* 2026-02-27 08:39:30,954 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:30,963 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 08:39:30,963 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.068) 0:02:49.183 ******* 2026-02-27 08:39:30,963 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:30 +0000 (0:00:00.068) 0:02:49.181 ******* 2026-02-27 08:39:31,075 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:31,088 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-02-27 08:39:31,089 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.125) 0:02:49.309 ******* 2026-02-27 08:39:31,089 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.125) 0:02:49.307 ******* 2026-02-27 08:39:31,175 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:31,190 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 08:39:31,190 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.101) 0:02:49.410 ******* 2026-02-27 08:39:31,190 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.101) 0:02:49.409 ******* 2026-02-27 08:39:31,252 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:31,266 p=14952 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2026-02-27 08:39:31,266 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.075) 0:02:49.486 ******* 2026-02-27 08:39:31,266 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.075) 0:02:49.484 ******* 2026-02-27 08:39:31,387 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2026-02-27 08:39:31,387 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.121) 0:02:49.607 ******* 2026-02-27 08:39:31,387 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.121) 0:02:49.606 ******* 2026-02-27 08:39:31,593 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:31,604 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2026-02-27 08:39:31,604 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.217) 0:02:49.824 ******* 2026-02-27 08:39:31,604 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:31 +0000 (0:00:00.217) 0:02:49.823 ******* 2026-02-27 08:39:32,382 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:32,391 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2026-02-27 08:39:32,391 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:32 +0000 (0:00:00.787) 0:02:50.611 ******* 2026-02-27 08:39:32,391 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:32 +0000 (0:00:00.786) 0:02:50.610 ******* 2026-02-27 08:39:32,844 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:32,856 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2026-02-27 08:39:32,857 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:32 +0000 (0:00:00.465) 0:02:51.077 ******* 2026-02-27 08:39:32,857 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:32 +0000 (0:00:00.465) 0:02:51.075 ******* 2026-02-27 08:39:33,627 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:33,640 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2026-02-27 08:39:33,640 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:33 +0000 (0:00:00.783) 0:02:51.860 ******* 2026-02-27 08:39:33,640 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:33 +0000 (0:00:00.783) 0:02:51.858 ******* 2026-02-27 08:39:34,434 p=14952 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.192)] => (item=controller) 2026-02-27 08:39:34,988 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=crc) 2026-02-27 08:39:35,170 p=14952 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2026-02-27 08:39:35,184 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2026-02-27 08:39:35,184 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:01.544) 0:02:53.404 ******* 2026-02-27 08:39:35,184 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:01.544) 0:02:53.402 ******* 2026-02-27 08:39:35,216 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:35,228 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2026-02-27 08:39:35,228 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:00.044) 0:02:53.448 ******* 2026-02-27 08:39:35,228 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:00.044) 0:02:53.447 ******* 2026-02-27 08:39:35,974 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:35,985 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2026-02-27 08:39:35,985 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:00.756) 0:02:54.205 ******* 2026-02-27 08:39:35,985 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:35 +0000 (0:00:00.756) 0:02:54.204 ******* 2026-02-27 08:39:36,024 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2026-02-27 08:39:36,037 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2026-02-27 08:39:36,037 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:36 +0000 (0:00:00.051) 0:02:54.257 ******* 2026-02-27 08:39:36,037 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:36 +0000 (0:00:00.051) 0:02:54.255 ******* 2026-02-27 08:39:36,686 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=1) 2026-02-27 08:39:37,176 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=2) 2026-02-27 08:39:37,789 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=3) 2026-02-27 08:39:38,347 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=4) 2026-02-27 08:39:38,960 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=5) 2026-02-27 08:39:39,491 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=6) 2026-02-27 08:39:40,037 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=7) 2026-02-27 08:39:40,596 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=8) 2026-02-27 08:39:41,182 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=9) 2026-02-27 08:39:41,738 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=10) 2026-02-27 08:39:42,250 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=11) 2026-02-27 08:39:42,852 p=14952 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=12) 2026-02-27 08:39:42,864 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2026-02-27 08:39:42,865 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:42 +0000 (0:00:06.827) 0:03:01.085 ******* 2026-02-27 08:39:42,865 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:42 +0000 (0:00:06.827) 0:03:01.083 ******* 2026-02-27 08:39:43,273 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:43,287 p=14952 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2026-02-27 08:39:43,287 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:43 +0000 (0:00:00.422) 0:03:01.507 ******* 2026-02-27 08:39:43,287 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:43 +0000 (0:00:00.422) 0:03:01.505 ******* 2026-02-27 08:39:44,569 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:44,595 p=14952 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2026-02-27 08:39:44,595 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:01.308) 0:03:02.815 ******* 2026-02-27 08:39:44,595 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:01.308) 0:03:02.814 ******* 2026-02-27 08:39:44,620 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:44,629 p=14952 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2026-02-27 08:39:44,629 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.034) 0:03:02.850 ******* 2026-02-27 08:39:44,629 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.034) 0:03:02.848 ******* 2026-02-27 08:39:44,759 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2026-02-27 08:39:44,759 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.129) 0:03:02.980 ******* 2026-02-27 08:39:44,759 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.129) 0:03:02.978 ******* 2026-02-27 08:39:44,785 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:44,794 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2026-02-27 08:39:44,794 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.034) 0:03:03.014 ******* 2026-02-27 08:39:44,794 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.034) 0:03:03.012 ******* 2026-02-27 08:39:44,833 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:39:44,848 p=14952 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2026-02-27 08:39:44,849 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.054) 0:03:03.069 ******* 2026-02-27 08:39:44,849 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.054) 0:03:03.067 ******* 2026-02-27 08:39:44,876 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:44,886 p=14952 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2026-02-27 08:39:44,886 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.037) 0:03:03.106 ******* 2026-02-27 08:39:44,886 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.037) 0:03:03.105 ******* 2026-02-27 08:39:44,937 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2026-02-27 08:39:44,937 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.050) 0:03:03.157 ******* 2026-02-27 08:39:44,937 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.050) 0:03:03.155 ******* 2026-02-27 08:39:44,962 p=14952 u=zuul n=ansible | ok: [localhost] => make_input_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 08:39:44,970 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2026-02-27 08:39:44,971 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.033) 0:03:03.191 ******* 2026-02-27 08:39:44,971 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.033) 0:03:03.189 ******* 2026-02-27 08:39:44,990 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:44,999 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2026-02-27 08:39:44,999 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.028) 0:03:03.219 ******* 2026-02-27 08:39:44,999 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:44 +0000 (0:00:00.028) 0:03:03.218 ******* 2026-02-27 08:39:45,043 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run.log 2026-02-27 08:39:46,354 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2026-02-27 08:39:46,356 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:39:46,371 p=14952 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2026-02-27 08:39:46,371 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:01.371) 0:03:04.591 ******* 2026-02-27 08:39:46,371 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:01.371) 0:03:04.590 ******* 2026-02-27 08:39:46,418 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2026-02-27 08:39:46,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.046) 0:03:04.638 ******* 2026-02-27 08:39:46,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.046) 0:03:04.637 ******* 2026-02-27 08:39:46,442 p=14952 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index@sha256:ee010d4351f6007cab55cd8227b4b9096fff8ee798bfefa3912698d0dcb47776 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 08:39:46,450 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2026-02-27 08:39:46,450 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.031) 0:03:04.670 ******* 2026-02-27 08:39:46,450 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.031) 0:03:04.668 ******* 2026-02-27 08:39:46,470 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:39:46,478 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2026-02-27 08:39:46,478 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.028) 0:03:04.699 ******* 2026-02-27 08:39:46,478 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:39:46 +0000 (0:00:00.028) 0:03:04.697 ******* 2026-02-27 08:39:46,523 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run.log 2026-02-27 08:44:40,696 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2026-02-27 08:44:40,705 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:44:40,750 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2026-02-27 08:44:40,750 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:44:40 +0000 (0:04:54.271) 0:07:58.970 ******* 2026-02-27 08:44:40,750 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:44:40 +0000 (0:04:54.271) 0:07:58.969 ******* 2026-02-27 08:47:47,208 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:47:47,245 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2026-02-27 08:47:47,246 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:47 +0000 (0:03:06.496) 0:11:05.466 ******* 2026-02-27 08:47:47,247 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:47 +0000 (0:03:06.496) 0:11:05.465 ******* 2026-02-27 08:47:47,780 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:47:47,794 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2026-02-27 08:47:47,795 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:47 +0000 (0:00:00.548) 0:11:06.015 ******* 2026-02-27 08:47:47,795 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:47 +0000 (0:00:00.547) 0:11:06.013 ******* 2026-02-27 08:47:49,865 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:47:49,880 p=14952 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2026-02-27 08:47:49,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:49 +0000 (0:00:02.085) 0:11:08.100 ******* 2026-02-27 08:47:49,880 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:49 +0000 (0:00:02.085) 0:11:08.099 ******* 2026-02-27 08:47:49,956 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2026-02-27 08:47:49,956 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:49 +0000 (0:00:00.075) 0:11:08.176 ******* 2026-02-27 08:47:49,956 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:49 +0000 (0:00:00.075) 0:11:08.175 ******* 2026-02-27 08:47:49,997 p=14952 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 08:47:50,006 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2026-02-27 08:47:50,006 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:50 +0000 (0:00:00.050) 0:11:08.226 ******* 2026-02-27 08:47:50,006 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:50 +0000 (0:00:00.050) 0:11:08.225 ******* 2026-02-27 08:47:50,158 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:47:50,168 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2026-02-27 08:47:50,168 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:50 +0000 (0:00:00.161) 0:11:08.388 ******* 2026-02-27 08:47:50,168 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:47:50 +0000 (0:00:00.161) 0:11:08.386 ******* 2026-02-27 08:47:50,226 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_openstack.log 2026-02-27 08:51:23,292 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2026-02-27 08:51:23,296 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:51:23,317 p=14952 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2026-02-27 08:51:23,318 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:03:33.149) 0:14:41.538 ******* 2026-02-27 08:51:23,318 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:03:33.149) 0:14:41.536 ******* 2026-02-27 08:51:23,349 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:23,362 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2026-02-27 08:51:23,362 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.044) 0:14:41.582 ******* 2026-02-27 08:51:23,362 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.044) 0:14:41.581 ******* 2026-02-27 08:51:23,482 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:23,490 p=14952 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2026-02-27 08:51:23,490 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.127) 0:14:41.710 ******* 2026-02-27 08:51:23,490 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.127) 0:14:41.708 ******* 2026-02-27 08:51:23,551 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2026-02-27 08:51:23,551 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.061) 0:14:41.771 ******* 2026-02-27 08:51:23,551 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.061) 0:14:41.770 ******* 2026-02-27 08:51:23,579 p=14952 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 08:51:23,588 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2026-02-27 08:51:23,588 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.037) 0:14:41.809 ******* 2026-02-27 08:51:23,588 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.037) 0:14:41.807 ******* 2026-02-27 08:51:23,609 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:23,618 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2026-02-27 08:51:23,618 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.029) 0:14:41.839 ******* 2026-02-27 08:51:23,618 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:23 +0000 (0:00:00.029) 0:14:41.837 ******* 2026-02-27 08:51:23,676 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run_openstack_deploy.log 2026-02-27 08:51:24,998 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2026-02-27 08:51:25,000 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:51:25,016 p=14952 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2026-02-27 08:51:25,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:01.397) 0:14:43.236 ******* 2026-02-27 08:51:25,016 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:01.397) 0:14:43.234 ******* 2026-02-27 08:51:25,081 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2026-02-27 08:51:25,081 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.065) 0:14:43.302 ******* 2026-02-27 08:51:25,081 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.065) 0:14:43.300 ******* 2026-02-27 08:51:25,111 p=14952 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 08:51:25,120 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2026-02-27 08:51:25,121 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.039) 0:14:43.341 ******* 2026-02-27 08:51:25,121 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.039) 0:14:43.339 ******* 2026-02-27 08:51:25,141 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:25,152 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2026-02-27 08:51:25,152 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.031) 0:14:43.372 ******* 2026-02-27 08:51:25,152 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:25 +0000 (0:00:00.031) 0:14:43.371 ******* 2026-02-27 08:51:25,219 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run_netconfig.log 2026-02-27 08:51:28,249 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2026-02-27 08:51:28,251 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:51:28,275 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2026-02-27 08:51:28,276 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:03.123) 0:14:46.496 ******* 2026-02-27 08:51:28,276 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:03.123) 0:14:46.494 ******* 2026-02-27 08:51:28,322 p=14952 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2026-02-27 08:51:28,350 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2026-02-27 08:51:28,350 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.074) 0:14:46.570 ******* 2026-02-27 08:51:28,350 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.074) 0:14:46.568 ******* 2026-02-27 08:51:28,385 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:51:28,394 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2026-02-27 08:51:28,394 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.044) 0:14:46.614 ******* 2026-02-27 08:51:28,394 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.044) 0:14:46.612 ******* 2026-02-27 08:51:28,418 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:28,426 p=14952 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2026-02-27 08:51:28,427 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.032) 0:14:46.647 ******* 2026-02-27 08:51:28,427 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.032) 0:14:46.645 ******* 2026-02-27 08:51:28,451 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 08:51:28,460 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2026-02-27 08:51:28,460 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.033) 0:14:46.680 ******* 2026-02-27 08:51:28,460 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.033) 0:14:46.678 ******* 2026-02-27 08:51:28,491 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:51:28,527 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-02-27 08:51:28,528 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.067) 0:14:46.748 ******* 2026-02-27 08:51:28,528 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:28 +0000 (0:00:00.067) 0:14:46.746 ******* 2026-02-27 08:51:29,189 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:51:29,203 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2026-02-27 08:51:29,204 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.675) 0:14:47.424 ******* 2026-02-27 08:51:29,204 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.675) 0:14:47.422 ******* 2026-02-27 08:51:29,247 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack notificationsBus: cluster: rabbitmq secret: osp-secret cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: osp-secret designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: osp-secret dns: template: options: - key: server values: - 192.168.122.1 override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: osp-secret storageRequest: 10G openstack-cell1: replicas: 1 secret: osp-secret storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: osp-secret storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: osp-secret horizon: apiOverride: route: {} template: replicas: 1 secret: osp-secret ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: osp-secret keystone: apiOverride: route: {} template: databaseInstance: openstack notificationsBus: cluster: rabbitmq override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack conductorServiceTemplate: replicas: 1 hasAPIAccess: true messagingBus: cluster: rabbitmq cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true messagingBus: cluster: rabbitmq-cell1 metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: osp-secret ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: osp-secret storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack notificationsBus: cluster: rabbitmq passwordSelectors: null secret: osp-secret enabled: false heatInstance: heat ceilometer: enabled: true notificationsBus: cluster: rabbitmq secret: osp-secret cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached messagingBus: cluster: rabbitmq passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false s3StorageConfig: schemas: - effectiveDate: '2024-11-18' version: v13 secret: name: cloudkitty-loki-s3 type: s3 secret: osp-secret serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: persistent: pvcStorageRequest: 10G retention: 24h strategy: persistent 2026-02-27 08:51:29,261 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2026-02-27 08:51:29,262 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.058) 0:14:47.482 ******* 2026-02-27 08:51:29,262 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.058) 0:14:47.480 ******* 2026-02-27 08:51:29,327 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_apply_the.log 2026-02-27 08:51:29,753 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 08:51:29,762 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2026-02-27 08:51:29,762 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.500) 0:14:47.983 ******* 2026-02-27 08:51:29,763 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:29 +0000 (0:00:00.500) 0:14:47.981 ******* 2026-02-27 08:51:29,800 p=14952 u=zuul n=ansible | Pausing for 30 seconds 2026-02-27 08:51:59,810 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 08:51:59,821 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2026-02-27 08:51:59,821 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:59 +0000 (0:00:30.058) 0:15:18.041 ******* 2026-02-27 08:51:59,821 p=14952 u=zuul n=ansible | Friday 27 February 2026 08:51:59 +0000 (0:00:30.058) 0:15:18.040 ******* 2026-02-27 09:00:27,596 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:27,617 p=14952 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2026-02-27 09:00:27,617 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:27 +0000 (0:08:27.795) 0:23:45.837 ******* 2026-02-27 09:00:27,617 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:27 +0000 (0:08:27.795) 0:23:45.836 ******* 2026-02-27 09:00:27,726 p=14952 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2026-02-27 09:00:27,726 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:27 +0000 (0:00:00.109) 0:23:45.947 ******* 2026-02-27 09:00:27,727 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:27 +0000 (0:00:00.109) 0:23:45.945 ******* 2026-02-27 09:00:28,206 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:28,216 p=14952 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2026-02-27 09:00:28,216 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.489) 0:23:46.436 ******* 2026-02-27 09:00:28,216 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.489) 0:23:46.434 ******* 2026-02-27 09:00:28,248 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:28,258 p=14952 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2026-02-27 09:00:28,258 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.042) 0:23:46.479 ******* 2026-02-27 09:00:28,258 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.042) 0:23:46.477 ******* 2026-02-27 09:00:28,759 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:28,767 p=14952 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-02-27 09:00:28,767 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.508) 0:23:46.987 ******* 2026-02-27 09:00:28,767 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.508) 0:23:46.986 ******* 2026-02-27 09:00:28,949 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:28,958 p=14952 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2026-02-27 09:00:28,958 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.191) 0:23:47.179 ******* 2026-02-27 09:00:28,958 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:28 +0000 (0:00:00.191) 0:23:47.177 ******* 2026-02-27 09:00:29,128 p=14952 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-02-27 09:00:29,128 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.169) 0:23:47.348 ******* 2026-02-27 09:00:29,128 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.169) 0:23:47.347 ******* 2026-02-27 09:00:29,373 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:29,384 p=14952 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-02-27 09:00:29,385 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.256) 0:23:47.605 ******* 2026-02-27 09:00:29,385 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.256) 0:23:47.603 ******* 2026-02-27 09:00:29,408 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:00:29,418 p=14952 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-02-27 09:00:29,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.033) 0:23:47.638 ******* 2026-02-27 09:00:29,418 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.033) 0:23:47.636 ******* 2026-02-27 09:00:29,442 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:00:29,451 p=14952 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-02-27 09:00:29,451 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.033) 0:23:47.671 ******* 2026-02-27 09:00:29,451 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.033) 0:23:47.670 ******* 2026-02-27 09:00:29,921 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:29,934 p=14952 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-02-27 09:00:29,934 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.482) 0:23:48.154 ******* 2026-02-27 09:00:29,934 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:29 +0000 (0:00:00.482) 0:23:48.153 ******* 2026-02-27 09:00:31,562 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:31,589 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2026-02-27 09:00:31,589 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:31 +0000 (0:00:01.654) 0:23:49.809 ******* 2026-02-27 09:00:31,589 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:31 +0000 (0:00:01.654) 0:23:49.808 ******* 2026-02-27 09:00:31,945 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:00:31,955 p=14952 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2026-02-27 09:00:31,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:31 +0000 (0:00:00.366) 0:23:50.175 ******* 2026-02-27 09:00:31,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:31 +0000 (0:00:00.366) 0:23:50.174 ******* 2026-02-27 09:00:32,435 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:32,451 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 09:00:32,451 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.495) 0:23:50.671 ******* 2026-02-27 09:00:32,451 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.495) 0:23:50.670 ******* 2026-02-27 09:00:32,524 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:32,532 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 09:00:32,532 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.081) 0:23:50.753 ******* 2026-02-27 09:00:32,532 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.081) 0:23:50.751 ******* 2026-02-27 09:00:32,620 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:32,635 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2026-02-27 09:00:32,635 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.102) 0:23:50.855 ******* 2026-02-27 09:00:32,635 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.102) 0:23:50.853 ******* 2026-02-27 09:00:32,748 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:00:32,765 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 09:00:32,766 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.130) 0:23:50.986 ******* 2026-02-27 09:00:32,766 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.130) 0:23:50.984 ******* 2026-02-27 09:00:32,820 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:32,830 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2026-02-27 09:00:32,830 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.064) 0:23:51.051 ******* 2026-02-27 09:00:32,830 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.064) 0:23:51.049 ******* 2026-02-27 09:00:32,858 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:00:32,869 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2026-02-27 09:00:32,869 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.038) 0:23:51.089 ******* 2026-02-27 09:00:32,869 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.038) 0:23:51.088 ******* 2026-02-27 09:00:32,919 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:00:32,930 p=14952 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2026-02-27 09:00:32,930 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.060) 0:23:51.150 ******* 2026-02-27 09:00:32,930 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.060) 0:23:51.148 ******* 2026-02-27 09:00:32,999 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_baremetal_compute_env var=make_edpm_baremetal_compute_env] *** 2026-02-27 09:00:32,999 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.069) 0:23:51.220 ******* 2026-02-27 09:00:33,000 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:32 +0000 (0:00:00.069) 0:23:51.218 ******* 2026-02-27 09:00:33,034 p=14952 u=zuul n=ansible | ok: [localhost] => make_edpm_baremetal_compute_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index@sha256:ee010d4351f6007cab55cd8227b4b9096fff8ee798bfefa3912698d0dcb47776 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:00:33,042 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_baremetal_compute_params var=make_edpm_baremetal_compute_params] *** 2026-02-27 09:00:33,042 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:33 +0000 (0:00:00.042) 0:23:51.263 ******* 2026-02-27 09:00:33,042 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:33 +0000 (0:00:00.042) 0:23:51.261 ******* 2026-02-27 09:00:33,067 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:00:33,076 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_baremetal_compute output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup, script=make edpm_baremetal_compute, dry_run={{ make_edpm_baremetal_compute_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_baremetal_compute_env|default({})), **(make_edpm_baremetal_compute_params|default({}))) }}] *** 2026-02-27 09:00:33,076 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:33 +0000 (0:00:00.033) 0:23:51.296 ******* 2026-02-27 09:00:33,076 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:00:33 +0000 (0:00:00.033) 0:23:51.295 ******* 2026-02-27 09:00:33,129 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_edpm_baremetal.log 2026-02-27 09:01:00,408 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_baremetal_compute_until | default(true) }} 2026-02-27 09:01:00,410 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:01:00,430 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2026-02-27 09:01:00,431 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:27.354) 0:24:18.651 ******* 2026-02-27 09:01:00,431 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:27.354) 0:24:18.649 ******* 2026-02-27 09:01:00,464 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:00,472 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2026-02-27 09:01:00,472 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.041) 0:24:18.693 ******* 2026-02-27 09:01:00,473 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.041) 0:24:18.691 ******* 2026-02-27 09:01:00,500 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:00,509 p=14952 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2026-02-27 09:01:00,509 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.036) 0:24:18.730 ******* 2026-02-27 09:01:00,509 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.036) 0:24:18.728 ******* 2026-02-27 09:01:00,562 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_baremetal_prep_env var=make_edpm_deploy_baremetal_prep_env] *** 2026-02-27 09:01:00,562 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.052) 0:24:18.782 ******* 2026-02-27 09:01:00,562 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.052) 0:24:18.780 ******* 2026-02-27 09:01:00,597 p=14952 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_baremetal_prep_env: BMAAS_INSTANCE_DISK_SIZE: 60 CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index@sha256:ee010d4351f6007cab55cd8227b4b9096fff8ee798bfefa3912698d0dcb47776 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:01:00,606 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_baremetal_prep_params var=make_edpm_deploy_baremetal_prep_params] *** 2026-02-27 09:01:00,606 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.043) 0:24:18.826 ******* 2026-02-27 09:01:00,606 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.043) 0:24:18.824 ******* 2026-02-27 09:01:00,662 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:00,671 p=14952 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_baremetal_prep output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_baremetal_prep, dry_run={{ make_edpm_deploy_baremetal_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_baremetal_prep_env|default({})), **(make_edpm_deploy_baremetal_prep_params|default({}))) }}] *** 2026-02-27 09:01:00,671 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.065) 0:24:18.892 ******* 2026-02-27 09:01:00,672 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:00 +0000 (0:00:00.065) 0:24:18.890 ******* 2026-02-27 09:01:00,725 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_edpm_deploy_baremetal.log 2026-02-27 09:01:09,889 p=14952 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_baremetal_prep_until | default(true) }} 2026-02-27 09:01:09,890 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:01:09,909 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations={% if content_provider_registry_ip is defined or not cifmw_edpm_deploy_baremetal_bootc %} apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %} {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-02-27 09:01:09,910 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:09 +0000 (0:00:09.238) 0:24:28.130 ******* 2026-02-27 09:01:09,910 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:09 +0000 (0:00:09.238) 0:24:28.128 ******* 2026-02-27 09:01:10,279 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:01:10,290 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2026-02-27 09:01:10,291 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.380) 0:24:28.511 ******* 2026-02-27 09:01:10,291 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.380) 0:24:28.509 ******* 2026-02-27 09:01:10,322 p=14952 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_baremetal_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment-ipam namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: baremetalSetTemplate: bmhLabelSelector: app: openstack bmhNamespace: openstack cloudUserName: cloud-admin ctlplaneInterface: enp1s0 env: - name: ANSIBLE_FORCE_COLOR value: 'True' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: cloud-admin ansibleVars: edpm_bootstrap_command: sudo dnf -y update edpm_container_registry_insecure_registries: - 38.102.83.107:5001 edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_sshd_allowed_ranges: - 192.168.122.0/24 enable_debug: false gather_facts: false growvols_args: /=8GB /tmp=1GB /home=1GB /var=100% image_prefix: openstack image_tag: current-podified registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret networks: - defaultRoute: true name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 nodes: edpm-compute-0: hostName: edpm-compute-0 preProvisioned: false services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2026-02-27 09:01:10,333 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2026-02-27 09:01:10,334 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.043) 0:24:28.554 ******* 2026-02-27 09:01:10,334 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.043) 0:24:28.552 ******* 2026-02-27 09:01:10,358 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:10,369 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-02-27 09:01:10,369 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.035) 0:24:28.589 ******* 2026-02-27 09:01:10,369 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.035) 0:24:28.588 ******* 2026-02-27 09:01:10,397 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:10,405 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-02-27 09:01:10,406 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.036) 0:24:28.626 ******* 2026-02-27 09:01:10,406 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.036) 0:24:28.624 ******* 2026-02-27 09:01:10,439 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:10,448 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-02-27 09:01:10,448 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.041) 0:24:28.668 ******* 2026-02-27 09:01:10,448 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.042) 0:24:28.666 ******* 2026-02-27 09:01:10,475 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:01:10,484 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-02-27 09:01:10,484 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.036) 0:24:28.704 ******* 2026-02-27 09:01:10,484 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.036) 0:24:28.702 ******* 2026-02-27 09:01:10,539 p=14952 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2026-02-27 09:01:10,876 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:01:10,887 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2026-02-27 09:01:10,887 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.403) 0:24:29.107 ******* 2026-02-27 09:01:10,887 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:10 +0000 (0:00:00.403) 0:24:29.106 ******* 2026-02-27 09:01:11,344 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:01:11,352 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2026-02-27 09:01:11,352 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:11 +0000 (0:00:00.465) 0:24:29.573 ******* 2026-02-27 09:01:11,352 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:01:11 +0000 (0:00:00.465) 0:24:29.571 ******* 2026-02-27 09:06:05,395 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:06:05,404 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2026-02-27 09:06:05,404 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:06:05 +0000 (0:04:54.051) 0:29:23.625 ******* 2026-02-27 09:06:05,404 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:06:05 +0000 (0:04:54.051) 0:29:23.623 ******* 2026-02-27 09:06:54,867 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:06:54,878 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2026-02-27 09:06:54,878 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:06:54 +0000 (0:00:49.473) 0:30:13.098 ******* 2026-02-27 09:06:54,878 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:06:54 +0000 (0:00:49.473) 0:30:13.097 ******* 2026-02-27 09:12:47,245 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:12:47,259 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2026-02-27 09:12:47,259 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:05:52.380) 0:36:05.479 ******* 2026-02-27 09:12:47,259 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:05:52.380) 0:36:05.478 ******* 2026-02-27 09:12:47,620 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:12:47,631 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2026-02-27 09:12:47,631 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:00:00.371) 0:36:05.851 ******* 2026-02-27 09:12:47,631 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:00:00.371) 0:36:05.849 ******* 2026-02-27 09:12:47,684 p=14952 u=zuul n=ansible | ok: [localhost] => compute_nodes_output.stdout_lines: - NAME STATE CONSUMER ONLINE ERROR AGE - edpm-compute-baremetal-00 provisioned openstack-edpm-ipam true 11m 2026-02-27 09:12:47,692 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2026-02-27 09:12:47,692 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:00:00.061) 0:36:05.912 ******* 2026-02-27 09:12:47,692 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:12:47 +0000 (0:00:00.061) 0:36:05.911 ******* 2026-02-27 09:41:54,099 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:41:54,113 p=14952 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2026-02-27 09:41:54,114 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:41:54 +0000 (0:29:06.421) 1:05:12.334 ******* 2026-02-27 09:41:54,114 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:41:54 +0000 (0:29:06.421) 1:05:12.332 ******* 2026-02-27 09:42:00,189 p=14952 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:00,214 p=14952 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 09:42:00,214 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:06.100) 1:05:18.434 ******* 2026-02-27 09:42:00,214 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:06.100) 1:05:18.433 ******* 2026-02-27 09:42:00,426 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:00,445 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2026-02-27 09:42:00,446 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.231) 1:05:18.666 ******* 2026-02-27 09:42:00,446 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.231) 1:05:18.664 ******* 2026-02-27 09:42:00,473 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,483 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2026-02-27 09:42:00,484 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:18.704 ******* 2026-02-27 09:42:00,484 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:18.702 ******* 2026-02-27 09:42:00,517 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2026-02-27 09:42:00,522 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2026-02-27 09:42:00,526 p=14952 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2026-02-27 09:42:00,528 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,545 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2026-02-27 09:42:00,545 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.061) 1:05:18.765 ******* 2026-02-27 09:42:00,545 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.061) 1:05:18.764 ******* 2026-02-27 09:42:00,574 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,585 p=14952 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2026-02-27 09:42:00,585 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.039) 1:05:18.805 ******* 2026-02-27 09:42:00,585 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.039) 1:05:18.803 ******* 2026-02-27 09:42:00,609 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,618 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2026-02-27 09:42:00,618 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.033) 1:05:18.839 ******* 2026-02-27 09:42:00,619 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.033) 1:05:18.837 ******* 2026-02-27 09:42:00,646 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,656 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2026-02-27 09:42:00,657 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:18.877 ******* 2026-02-27 09:42:00,657 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:18.875 ******* 2026-02-27 09:42:00,699 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,707 p=14952 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2026-02-27 09:42:00,708 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.050) 1:05:18.928 ******* 2026-02-27 09:42:00,708 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.050) 1:05:18.926 ******* 2026-02-27 09:42:00,733 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,756 p=14952 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2026-02-27 09:42:00,757 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.049) 1:05:18.977 ******* 2026-02-27 09:42:00,757 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.049) 1:05:18.975 ******* 2026-02-27 09:42:00,784 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,798 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2026-02-27 09:42:00,798 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.041) 1:05:19.018 ******* 2026-02-27 09:42:00,798 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.041) 1:05:19.016 ******* 2026-02-27 09:42:00,821 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,833 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2026-02-27 09:42:00,833 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.035) 1:05:19.054 ******* 2026-02-27 09:42:00,833 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.035) 1:05:19.052 ******* 2026-02-27 09:42:00,856 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,867 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2026-02-27 09:42:00,868 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.034) 1:05:19.088 ******* 2026-02-27 09:42:00,868 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.034) 1:05:19.086 ******* 2026-02-27 09:42:00,895 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,907 p=14952 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2026-02-27 09:42:00,907 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.039) 1:05:19.127 ******* 2026-02-27 09:42:00,907 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.039) 1:05:19.126 ******* 2026-02-27 09:42:00,934 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,946 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-02-27 09:42:00,946 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:19.166 ******* 2026-02-27 09:42:00,946 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.038) 1:05:19.165 ******* 2026-02-27 09:42:00,976 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:00,987 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2026-02-27 09:42:00,987 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.041) 1:05:19.207 ******* 2026-02-27 09:42:00,987 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:00 +0000 (0:00:00.041) 1:05:19.206 ******* 2026-02-27 09:42:01,019 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,028 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-02-27 09:42:01,028 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.040) 1:05:19.248 ******* 2026-02-27 09:42:01,028 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.040) 1:05:19.246 ******* 2026-02-27 09:42:01,057 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,073 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-02-27 09:42:01,074 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.045) 1:05:19.294 ******* 2026-02-27 09:42:01,074 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.045) 1:05:19.292 ******* 2026-02-27 09:42:01,103 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,114 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-02-27 09:42:01,114 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.040) 1:05:19.335 ******* 2026-02-27 09:42:01,115 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.040) 1:05:19.333 ******* 2026-02-27 09:42:01,140 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,153 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-02-27 09:42:01,154 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.039) 1:05:19.374 ******* 2026-02-27 09:42:01,154 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.039) 1:05:19.372 ******* 2026-02-27 09:42:01,180 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,189 p=14952 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2026-02-27 09:42:01,189 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.035) 1:05:19.410 ******* 2026-02-27 09:42:01,189 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.035) 1:05:19.408 ******* 2026-02-27 09:42:01,214 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,223 p=14952 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2026-02-27 09:42:01,223 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.034) 1:05:19.444 ******* 2026-02-27 09:42:01,224 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.034) 1:05:19.442 ******* 2026-02-27 09:42:01,268 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,320 p=14952 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2026-02-27 09:42:01,320 p=14952 u=zuul n=ansible | skipping: no hosts matched 2026-02-27 09:42:01,323 p=14952 u=zuul n=ansible | [WARNING]: Could not match supplied host pattern, ignoring: computes 2026-02-27 09:42:01,323 p=14952 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2026-02-27 09:42:01,323 p=14952 u=zuul n=ansible | skipping: no hosts matched 2026-02-27 09:42:01,325 p=14952 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2026-02-27 09:42:01,343 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 09:42:01,343 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.119) 1:05:19.563 ******* 2026-02-27 09:42:01,343 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.119) 1:05:19.562 ******* 2026-02-27 09:42:01,395 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:01,402 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 09:42:01,402 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.059) 1:05:19.623 ******* 2026-02-27 09:42:01,402 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.059) 1:05:19.621 ******* 2026-02-27 09:42:01,513 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:01,522 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2026-02-27 09:42:01,522 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.119) 1:05:19.742 ******* 2026-02-27 09:42:01,522 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.119) 1:05:19.740 ******* 2026-02-27 09:42:01,637 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,668 p=14952 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2026-02-27 09:42:01,698 p=14952 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2026-02-27 09:42:01,698 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.176) 1:05:19.918 ******* 2026-02-27 09:42:01,698 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.176) 1:05:19.916 ******* 2026-02-27 09:42:01,727 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,734 p=14952 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2026-02-27 09:42:01,735 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.036) 1:05:19.955 ******* 2026-02-27 09:42:01,735 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.036) 1:05:19.953 ******* 2026-02-27 09:42:01,764 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:01,774 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 09:42:01,775 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.039) 1:05:19.995 ******* 2026-02-27 09:42:01,775 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.039) 1:05:19.993 ******* 2026-02-27 09:42:01,844 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:01,858 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 09:42:01,858 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.083) 1:05:20.079 ******* 2026-02-27 09:42:01,858 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.083) 1:05:20.077 ******* 2026-02-27 09:42:01,946 p=14952 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:01,955 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2026-02-27 09:42:01,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.096) 1:05:20.175 ******* 2026-02-27 09:42:01,955 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:01 +0000 (0:00:00.096) 1:05:20.173 ******* 2026-02-27 09:42:02,052 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:02,066 p=14952 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2026-02-27 09:42:02,066 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.111) 1:05:20.286 ******* 2026-02-27 09:42:02,066 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.111) 1:05:20.284 ******* 2026-02-27 09:42:02,100 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:02,119 p=14952 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 09:42:02,119 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.053) 1:05:20.340 ******* 2026-02-27 09:42:02,120 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.053) 1:05:20.338 ******* 2026-02-27 09:42:02,149 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:02,158 p=14952 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 09:42:02,158 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.038) 1:05:20.378 ******* 2026-02-27 09:42:02,158 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.038) 1:05:20.377 ******* 2026-02-27 09:42:02,186 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:02,196 p=14952 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-02-27 09:42:02,196 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.037) 1:05:20.416 ******* 2026-02-27 09:42:02,196 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.037) 1:05:20.414 ******* 2026-02-27 09:42:02,310 p=14952 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:02,325 p=14952 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2026-02-27 09:42:02,325 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.128) 1:05:20.545 ******* 2026-02-27 09:42:02,325 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.128) 1:05:20.543 ******* 2026-02-27 09:42:02,343 p=14952 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-02-27 09:42:02,343 p=14952 u=zuul n=ansible | localhost : ok=220 changed=79 unreachable=0 failed=0 skipped=161 rescued=0 ignored=1 2026-02-27 09:42:02,343 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.018) 1:05:20.564 ******* 2026-02-27 09:42:02,343 p=14952 u=zuul n=ansible | =============================================================================== 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed 1746.42s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 507.80s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state - 352.38s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 294.27s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created - 294.05s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------ 213.15s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation --------------- 186.50s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available -- 49.47s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 44.66s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 30.21s 2026-02-27 09:42:02,344 p=14952 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.06s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_yamls_makes : Run edpm_baremetal_compute ----------------------- 27.35s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 22.71s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_baremetal_prep -------------------- 9.24s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 8.52s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 6.83s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped --- 6.10s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.31s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 4.99s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 3.12s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | Friday 27 February 2026 09:42:02 +0000 (0:00:00.019) 1:05:20.563 ******* 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | =============================================================================== 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | edpm_deploy_baremetal ------------------------------------------------ 2450.60s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | edpm_prepare ---------------------------------------------------------- 730.04s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 550.57s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | run_hook --------------------------------------------------------------- 49.83s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 38.04s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 31.97s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 17.84s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | ci_local_storage ------------------------------------------------------- 13.21s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | rhol_crc ---------------------------------------------------------------- 9.14s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | openshift_login --------------------------------------------------------- 6.12s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 5.56s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 3.56s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 2.83s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_ca -------------------------------------------------------------- 2.81s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 2.73s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | install_openstack_ca ---------------------------------------------------- 1.40s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 1.16s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 0.87s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | edpm_deploy ------------------------------------------------------------- 0.54s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | manage_secrets ---------------------------------------------------------- 0.49s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.38s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.34s 2026-02-27 09:42:02,345 p=14952 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.29s 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.07s 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.06s 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.03s 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | ansible.builtin.meta ---------------------------------------------------- 0.02s 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-02-27 09:42:02,346 p=14952 u=zuul n=ansible | total ---------------------------------------------------------------- 3920.51s 2026-02-27 09:42:06,959 p=39824 u=zuul n=ansible | PLAY [OpenStack minor version update] ****************************************** 2026-02-27 09:42:07,002 p=39824 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2026-02-27 09:42:07,003 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.049) 0:00:00.049 ******* 2026-02-27 09:42:07,003 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.048) 0:00:00.048 ******* 2026-02-27 09:42:07,349 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:07,370 p=39824 u=zuul n=ansible | TASK [Set cifmw_basedir if not defined cifmw_basedir={{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}] *** 2026-02-27 09:42:07,370 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.367) 0:00:00.416 ******* 2026-02-27 09:42:07,370 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.367) 0:00:00.415 ******* 2026-02-27 09:42:07,395 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:07,418 p=39824 u=zuul n=ansible | TASK [Set update artifacts basedir if not defined cifmw_update_artifacts_basedir={{ cifmw_update_artifacts_basedir | default(cifmw_basedir ~ '/tests/update') }}] *** 2026-02-27 09:42:07,419 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.048) 0:00:00.465 ******* 2026-02-27 09:42:07,419 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.048) 0:00:00.464 ******* 2026-02-27 09:42:07,447 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:07,466 p=39824 u=zuul n=ansible | TASK [Initialize monitoring name=update, tasks_from=init_monitoring.yml] ******* 2026-02-27 09:42:07,467 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.047) 0:00:00.513 ******* 2026-02-27 09:42:07,467 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.047) 0:00:00.512 ******* 2026-02-27 09:42:07,536 p=39824 u=zuul n=ansible | TASK [update : Ensure update log directory exists. path={{ cifmw_update_artifacts_basedir }}, state=directory, mode=0755] *** 2026-02-27 09:42:07,537 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.070) 0:00:00.583 ******* 2026-02-27 09:42:07,537 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.069) 0:00:00.582 ******* 2026-02-27 09:42:07,723 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:07,737 p=39824 u=zuul n=ansible | TASK [update : Create update step monitoring file src=update_event.sh.j2, dest={{ cifmw_update_artifacts_basedir }}/update_event.sh, mode=0755] *** 2026-02-27 09:42:07,737 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.200) 0:00:00.783 ******* 2026-02-27 09:42:07,737 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:07 +0000 (0:00:00.200) 0:00:00.782 ******* 2026-02-27 09:42:08,430 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:08,452 p=39824 u=zuul n=ansible | TASK [update : Create update stage monitoring file src=monitor_resources_changes.sh.j2, dest={{ cifmw_update_artifacts_basedir }}/monitor_resources_changes.sh, mode=0755] *** 2026-02-27 09:42:08,452 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:08 +0000 (0:00:00.714) 0:00:01.498 ******* 2026-02-27 09:42:08,452 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:08 +0000 (0:00:00.714) 0:00:01.497 ******* 2026-02-27 09:42:09,817 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:09,835 p=39824 u=zuul n=ansible | TASK [update : Set update step to Starting Update _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh {{ cifmw_update_state | default("Starting Update") }} ] *** 2026-02-27 09:42:09,835 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:09 +0000 (0:00:01.382) 0:00:02.881 ******* 2026-02-27 09:42:09,835 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:09 +0000 (0:00:01.383) 0:00:02.880 ******* 2026-02-27 09:42:12,187 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:12,208 p=39824 u=zuul n=ansible | TASK [update : Initialize monitoring] ****************************************** 2026-02-27 09:42:12,208 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:12 +0000 (0:00:02.372) 0:00:05.254 ******* 2026-02-27 09:42:12,208 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:12 +0000 (0:00:02.372) 0:00:05.253 ******* 2026-02-27 09:42:20,758 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:20,774 p=39824 u=zuul n=ansible | TASK [update : Start monitoring creates={{ cifmw_update_artifacts_basedir }}/monitor_resources_changes.pid, _raw_params={{ cifmw_update_artifacts_basedir }}/monitor_resources_changes.sh -a monitor -t {{ cifmw_update_resources_monitoring_interval }} -l {{ cifmw_update_artifacts_basedir }}/monitor_resources_script.log] *** 2026-02-27 09:42:20,775 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:20 +0000 (0:00:08.567) 0:00:13.821 ******* 2026-02-27 09:42:20,775 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:20 +0000 (0:00:08.567) 0:00:13.820 ******* 2026-02-27 09:42:20,959 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:21,001 p=39824 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2026-02-27 09:42:21,002 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.226) 0:00:14.048 ******* 2026-02-27 09:42:21,002 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.226) 0:00:14.047 ******* 2026-02-27 09:42:21,118 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:21,132 p=39824 u=zuul n=ansible | TASK [Set install_yamls environment for minor update phase cifmw_minor_update_env={{ (cifmw_install_yamls_environment | default({})) | combine({'PATH': cifmw_path | default(ansible_user_dir ~ '/.crc/bin:' ~ ansible_user_dir ~ '/.crc/bin/oc:' ~ ansible_user_dir ~ '/bin:' ~ ansible_env.PATH)}) | combine({'OPENSTACK_IMG': cifmw_minor_update_index_image}) | combine({'BMO_CLEANUP': false}) }}] *** 2026-02-27 09:42:21,132 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.130) 0:00:14.178 ******* 2026-02-27 09:42:21,132 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.130) 0:00:14.177 ******* 2026-02-27 09:42:21,167 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:42:21,178 p=39824 u=zuul n=ansible | TASK [Set update step to Running openstack cleanup _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Running openstack cleanup ] *** 2026-02-27 09:42:21,178 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.045) 0:00:14.224 ******* 2026-02-27 09:42:21,178 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:21 +0000 (0:00:00.045) 0:00:14.223 ******* 2026-02-27 09:42:23,366 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:23,381 p=39824 u=zuul n=ansible | TASK [Run make openstack_cleanup name=install_yamls_makes, tasks_from=make_openstack_cleanup] *** 2026-02-27 09:42:23,381 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:02.203) 0:00:16.428 ******* 2026-02-27 09:42:23,382 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:02.203) 0:00:16.427 ******* 2026-02-27 09:42:23,443 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_cleanup_env var=make_openstack_cleanup_env] *** 2026-02-27 09:42:23,443 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.061) 0:00:16.489 ******* 2026-02-27 09:42:23,443 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.061) 0:00:16.488 ******* 2026-02-27 09:42:23,470 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_cleanup_env: BMAAS_INSTANCE_DISK_SIZE: 60 BMO_CLEANUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: 38.102.83.107:5001/openstack-k8s-operators/openstack-operator-index:a42ebae1992fcedaf005662d6e1bf75431c843a7 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:42:23,481 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_cleanup_params var=make_openstack_cleanup_params] *** 2026-02-27 09:42:23,482 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.038) 0:00:16.528 ******* 2026-02-27 09:42:23,482 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.038) 0:00:16.527 ******* 2026-02-27 09:42:23,501 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:23,513 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_cleanup output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_cleanup, dry_run={{ make_openstack_cleanup_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_cleanup_env|default({})), **(make_openstack_cleanup_params|default({}))) }}] *** 2026-02-27 09:42:23,514 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.031) 0:00:16.560 ******* 2026-02-27 09:42:23,514 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:23 +0000 (0:00:00.031) 0:00:16.559 ******* 2026-02-27 09:42:23,557 p=39824 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_openstack.log 2026-02-27 09:42:32,746 p=39824 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_cleanup_until | default(true) }} 2026-02-27 09:42:32,748 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:32,772 p=39824 u=zuul n=ansible | TASK [Set update step to Running openstack wait _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Running openstack wait ] *** 2026-02-27 09:42:32,772 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:32 +0000 (0:00:09.258) 0:00:25.818 ******* 2026-02-27 09:42:32,772 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:32 +0000 (0:00:09.258) 0:00:25.817 ******* 2026-02-27 09:42:34,991 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:42:35,002 p=39824 u=zuul n=ansible | TASK [Run make openstack_wait (minor update) name=install_yamls_makes, tasks_from=make_openstack_wait] *** 2026-02-27 09:42:35,002 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:02.229) 0:00:28.048 ******* 2026-02-27 09:42:35,002 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:02.229) 0:00:28.047 ******* 2026-02-27 09:42:35,052 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_wait_env var=make_openstack_wait_env] *** 2026-02-27 09:42:35,052 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.050) 0:00:28.098 ******* 2026-02-27 09:42:35,052 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.050) 0:00:28.097 ******* 2026-02-27 09:42:35,089 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_wait_env: BMAAS_INSTANCE_DISK_SIZE: 60 BMO_CLEANUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: 38.102.83.107:5001/openstack-k8s-operators/openstack-operator-index:a42ebae1992fcedaf005662d6e1bf75431c843a7 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:42:35,098 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_wait_params var=make_openstack_wait_params] *** 2026-02-27 09:42:35,098 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.046) 0:00:28.144 ******* 2026-02-27 09:42:35,098 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.046) 0:00:28.143 ******* 2026-02-27 09:42:35,132 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:42:35,148 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_wait output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_wait, dry_run={{ make_openstack_wait_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_wait_env|default({})), **(make_openstack_wait_params|default({}))) }}] *** 2026-02-27 09:42:35,148 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.050) 0:00:28.194 ******* 2026-02-27 09:42:35,148 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:42:35 +0000 (0:00:00.050) 0:00:28.193 ******* 2026-02-27 09:42:35,215 p=39824 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_openstack.log 2026-02-27 09:43:53,201 p=39824 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_wait_until | default(true) }} 2026-02-27 09:43:53,205 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:43:53,224 p=39824 u=zuul n=ansible | TASK [Set update step to Running openstack init _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Running openstack init ] *** 2026-02-27 09:43:53,224 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:53 +0000 (0:01:18.075) 0:01:46.270 ******* 2026-02-27 09:43:53,224 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:53 +0000 (0:01:18.075) 0:01:46.269 ******* 2026-02-27 09:43:55,411 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:43:55,425 p=39824 u=zuul n=ansible | TASK [Run make openstack_init (minor update) name=install_yamls_makes, tasks_from=make_openstack_init] *** 2026-02-27 09:43:55,425 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:02.201) 0:01:48.471 ******* 2026-02-27 09:43:55,425 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:02.201) 0:01:48.470 ******* 2026-02-27 09:43:55,511 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2026-02-27 09:43:55,511 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.086) 0:01:48.558 ******* 2026-02-27 09:43:55,511 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.086) 0:01:48.556 ******* 2026-02-27 09:43:55,533 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMAAS_INSTANCE_DISK_SIZE: 60 BMO_CLEANUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: 38.102.83.107:5001/openstack-k8s-operators/openstack-operator-index:a42ebae1992fcedaf005662d6e1bf75431c843a7 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:43:55,547 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2026-02-27 09:43:55,547 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.035) 0:01:48.593 ******* 2026-02-27 09:43:55,547 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.035) 0:01:48.592 ******* 2026-02-27 09:43:55,565 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:43:55,576 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2026-02-27 09:43:55,576 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.028) 0:01:48.622 ******* 2026-02-27 09:43:55,576 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:43:55 +0000 (0:00:00.028) 0:01:48.621 ******* 2026-02-27 09:43:55,651 p=39824 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_run_openstack.log 2026-02-27 09:45:46,863 p=39824 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2026-02-27 09:45:46,865 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:45:46,902 p=39824 u=zuul n=ansible | TASK [Set update step to Waiting for new version to be available _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Waiting for new version to be available ] *** 2026-02-27 09:45:46,902 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:45:46 +0000 (0:01:51.326) 0:03:39.948 ******* 2026-02-27 09:45:46,902 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:45:46 +0000 (0:01:51.326) 0:03:39.947 ******* 2026-02-27 09:45:49,133 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:45:49,147 p=39824 u=zuul n=ansible | TASK [Wait for availableVersion to be different from deployedVersion kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, api_version=core.openstack.org/v1beta1, kind=OpenStackVersion, namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] | default('openstack') }}] *** 2026-02-27 09:45:49,147 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:45:49 +0000 (0:00:02.244) 0:03:42.193 ******* 2026-02-27 09:45:49,147 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:45:49 +0000 (0:00:02.244) 0:03:42.192 ******* 2026-02-27 09:46:51,285 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:46:51,304 p=39824 u=zuul n=ansible | TASK [Get available version from OpenStackVersion CR cifmw_minor_update_target_version={{ openstackversion_wait_info.resources[0].status.availableVersion }}] *** 2026-02-27 09:46:51,304 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:51 +0000 (0:01:02.157) 0:04:44.350 ******* 2026-02-27 09:46:51,304 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:51 +0000 (0:01:02.157) 0:04:44.349 ******* 2026-02-27 09:46:51,342 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 09:46:51,354 p=39824 u=zuul n=ansible | TASK [Set update step to Patching OpenStackVersion CR _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Patching OpenStackVersion CR with version {{ cifmw_minor_update_target_version }} ] *** 2026-02-27 09:46:51,354 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:51 +0000 (0:00:00.049) 0:04:44.400 ******* 2026-02-27 09:46:51,354 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:51 +0000 (0:00:00.049) 0:04:44.399 ******* 2026-02-27 09:46:53,611 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:46:53,622 p=39824 u=zuul n=ansible | TASK [Patch OpenStackVersion CR availableVersion name=install_yamls_makes, tasks_from=make_openstack_patch_version] *** 2026-02-27 09:46:53,622 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:02.267) 0:04:46.668 ******* 2026-02-27 09:46:53,622 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:02.267) 0:04:46.667 ******* 2026-02-27 09:46:53,688 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_patch_version_env var=make_openstack_patch_version_env] *** 2026-02-27 09:46:53,688 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.066) 0:04:46.734 ******* 2026-02-27 09:46:53,688 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.066) 0:04:46.733 ******* 2026-02-27 09:46:53,717 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_patch_version_env: BMAAS_INSTANCE_DISK_SIZE: 60 BMO_CLEANUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: 38.102.83.107:5001/openstack-k8s-operators/openstack-operator-index:a42ebae1992fcedaf005662d6e1bf75431c843a7 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:46:53,731 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_patch_version_params var=make_openstack_patch_version_params] *** 2026-02-27 09:46:53,731 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.043) 0:04:46.777 ******* 2026-02-27 09:46:53,731 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.043) 0:04:46.776 ******* 2026-02-27 09:46:53,755 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:46:53,812 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_patch_version output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_patch_version, dry_run={{ make_openstack_patch_version_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_patch_version_env|default({})), **(make_openstack_patch_version_params|default({}))) }}] *** 2026-02-27 09:46:53,812 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.080) 0:04:46.858 ******* 2026-02-27 09:46:53,812 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:53 +0000 (0:00:00.080) 0:04:46.857 ******* 2026-02-27 09:46:53,865 p=39824 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_run_openstack_patch.log 2026-02-27 09:46:55,190 p=39824 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_patch_version_until | default(true) }} 2026-02-27 09:46:55,192 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:46:55,214 p=39824 u=zuul n=ansible | TASK [Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2026-02-27 09:46:55,214 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:01.401) 0:04:48.260 ******* 2026-02-27 09:46:55,214 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:01.401) 0:04:48.259 ******* 2026-02-27 09:46:55,246 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:46:55,258 p=39824 u=zuul n=ansible | TASK [Set update step to Updating container images _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Updating container images ] *** 2026-02-27 09:46:55,258 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.044) 0:04:48.304 ******* 2026-02-27 09:46:55,258 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.044) 0:04:48.303 ******* 2026-02-27 09:46:55,299 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:46:55,313 p=39824 u=zuul n=ansible | TASK [Prepare and patch OpenStackVersion CR for update name=update_containers] *** 2026-02-27 09:46:55,313 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.054) 0:04:48.359 ******* 2026-02-27 09:46:55,313 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.054) 0:04:48.358 ******* 2026-02-27 09:46:55,347 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 09:46:55,361 p=39824 u=zuul n=ansible | TASK [Set update step to Starting the CI update sequence _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Starting the CI update sequence ] *** 2026-02-27 09:46:55,362 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.048) 0:04:48.408 ******* 2026-02-27 09:46:55,362 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:55 +0000 (0:00:00.048) 0:04:48.407 ******* 2026-02-27 09:46:57,595 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 09:46:57,619 p=39824 u=zuul n=ansible | TASK [Run make openstack_update_run name=install_yamls_makes, tasks_from=make_openstack_update_run] *** 2026-02-27 09:46:57,619 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:02.257) 0:04:50.665 ******* 2026-02-27 09:46:57,619 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:02.257) 0:04:50.664 ******* 2026-02-27 09:46:57,733 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_update_run_env var=make_openstack_update_run_env] *** 2026-02-27 09:46:57,734 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:00.114) 0:04:50.780 ******* 2026-02-27 09:46:57,734 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:00.114) 0:04:50.779 ******* 2026-02-27 09:46:57,771 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_update_run_env: BMAAS_INSTANCE_DISK_SIZE: 60 BMO_CLEANUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_BRANCH: '' OPENSTACK_IMG: 38.102.83.107:5001/openstack-k8s-operators/openstack-operator-index:a42ebae1992fcedaf005662d6e1bf75431c843a7 OPENSTACK_K8S_BRANCH: main OPENSTACK_REPO: /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2026-02-27 09:46:57,785 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_update_run_params var=make_openstack_update_run_params] *** 2026-02-27 09:46:57,785 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:00.051) 0:04:50.832 ******* 2026-02-27 09:46:57,786 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:57 +0000 (0:00:00.051) 0:04:50.831 ******* 2026-02-27 09:46:57,998 p=39824 u=zuul n=ansible | ok: [localhost] => make_openstack_update_run_params: OPENSTACK_VERSION: 0.6.0-1772179722 TIMEOUT: 1200s 2026-02-27 09:46:58,008 p=39824 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_update_run output_dir={{ cifmw_basedir }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_update_run, dry_run={{ make_openstack_update_run_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_update_run_env|default({})), **(make_openstack_update_run_params|default({}))) }}] *** 2026-02-27 09:46:58,008 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:58 +0000 (0:00:00.222) 0:04:51.054 ******* 2026-02-27 09:46:58,008 p=39824 u=zuul n=ansible | Friday 27 February 2026 09:46:58 +0000 (0:00:00.222) 0:04:51.053 ******* 2026-02-27 09:46:58,051 p=39824 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_015_run_openstack_update.log 2026-02-27 10:04:48,976 p=39824 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_update_run_until | default(true) }} 2026-02-27 10:04:48,982 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:04:49,036 p=39824 u=zuul n=ansible | TASK [Set update step to Verifying update completion _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh Verifying update completion ] *** 2026-02-27 10:04:49,036 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:49 +0000 (0:17:51.028) 0:22:42.083 ******* 2026-02-27 10:04:49,037 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:49 +0000 (0:17:51.028) 0:22:42.082 ******* 2026-02-27 10:04:51,295 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:04:51,308 p=39824 u=zuul n=ansible | TASK [Verify deployed version matches target version kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, api_version=core.openstack.org/v1beta1, kind=OpenStackVersion, namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] | default('openstack') }}] *** 2026-02-27 10:04:51,308 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:51 +0000 (0:00:02.271) 0:22:44.354 ******* 2026-02-27 10:04:51,308 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:51 +0000 (0:00:02.271) 0:22:44.353 ******* 2026-02-27 10:04:52,188 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:04:52,207 p=39824 u=zuul n=ansible | TASK [Set update step to CI update sequence complete _raw_params={{ cifmw_update_artifacts_basedir }}/update_event.sh CI update verification successful - Target version {{ cifmw_minor_update_target_version }} matches deployed version {{ openstackversion_verify_info.resources[0].status.deployedVersion }} ] *** 2026-02-27 10:04:52,207 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:52 +0000 (0:00:00.898) 0:22:45.253 ******* 2026-02-27 10:04:52,207 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:52 +0000 (0:00:00.898) 0:22:45.252 ******* 2026-02-27 10:04:54,474 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:04:54,502 p=39824 u=zuul n=ansible | TASK [Display update verification result msg=Update verification successful: Target version {{ cifmw_minor_update_target_version }} matches deployed version {{ openstackversion_verify_info.resources[0].status.deployedVersion }}] *** 2026-02-27 10:04:54,503 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:02.295) 0:22:47.549 ******* 2026-02-27 10:04:54,503 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:02.295) 0:22:47.548 ******* 2026-02-27 10:04:54,536 p=39824 u=zuul n=ansible | ok: [localhost] => msg: 'Update verification successful: Target version 0.6.0-1772179722 matches deployed version 0.6.0-1772179722' 2026-02-27 10:04:54,557 p=39824 u=zuul n=ansible | TASK [Verify monitoring pid file path={{ cifmw_update_artifacts_basedir }}/monitor_resources_changes.pid] *** 2026-02-27 10:04:54,557 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:00.054) 0:22:47.604 ******* 2026-02-27 10:04:54,558 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:00.054) 0:22:47.603 ******* 2026-02-27 10:04:54,791 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:04:54,805 p=39824 u=zuul n=ansible | TASK [Stop the monitoring process _raw_params=kill $(cat {{ cifmw_update_artifacts_basedir }}/monitor_resources_changes.pid)] *** 2026-02-27 10:04:54,805 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:00.247) 0:22:47.851 ******* 2026-02-27 10:04:54,805 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:54 +0000 (0:00:00.247) 0:22:47.850 ******* 2026-02-27 10:04:55,033 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:04:55,046 p=39824 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 10:04:55,047 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.241) 0:22:48.093 ******* 2026-02-27 10:04:55,047 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.241) 0:22:48.092 ******* 2026-02-27 10:04:55,192 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:04:55,236 p=39824 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 10:04:55,237 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.189) 0:22:48.283 ******* 2026-02-27 10:04:55,237 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.189) 0:22:48.282 ******* 2026-02-27 10:04:55,325 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:04:55,341 p=39824 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-02-27 10:04:55,342 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.105) 0:22:48.388 ******* 2026-02-27 10:04:55,342 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.105) 0:22:48.387 ******* 2026-02-27 10:04:55,445 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:04:55,465 p=39824 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-02-27 10:04:55,466 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.123) 0:22:48.512 ******* 2026-02-27 10:04:55,466 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.123) 0:22:48.511 ******* 2026-02-27 10:04:55,513 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:04:55,525 p=39824 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2026-02-27 10:04:55,525 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.059) 0:22:48.571 ******* 2026-02-27 10:04:55,525 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:04:55 +0000 (0:00:00.059) 0:22:48.570 ******* 2026-02-27 10:05:01,046 p=39824 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2026-02-27 10:05:01,074 p=39824 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2026-02-27 10:05:01,075 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:01 +0000 (0:00:05.549) 0:22:54.121 ******* 2026-02-27 10:05:01,075 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:01 +0000 (0:00:05.549) 0:22:54.120 ******* 2026-02-27 10:05:04,244 p=39824 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2026-02-27 10:05:07,157 p=39824 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2026-02-27 10:05:07,219 p=39824 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2026-02-27 10:05:07,219 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:07 +0000 (0:00:06.144) 0:23:00.265 ******* 2026-02-27 10:05:07,219 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:07 +0000 (0:00:06.144) 0:23:00.264 ******* 2026-02-27 10:05:10,089 p=39824 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2026-02-27 10:05:10,118 p=39824 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-02-27 10:05:10,119 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:10 +0000 (0:00:02.899) 0:23:03.165 ******* 2026-02-27 10:05:10,119 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:10 +0000 (0:00:02.899) 0:23:03.164 ******* 2026-02-27 10:05:10,211 p=39824 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2026-02-27 10:05:10,233 p=39824 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-02-27 10:05:10,234 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:10 +0000 (0:00:00.115) 0:23:03.280 ******* 2026-02-27 10:05:10,234 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:10 +0000 (0:00:00.115) 0:23:03.279 ******* 2026-02-27 10:05:14,815 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:14,838 p=39824 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-02-27 10:05:14,838 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:14 +0000 (0:00:04.604) 0:23:07.884 ******* 2026-02-27 10:05:14,838 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:14 +0000 (0:00:04.604) 0:23:07.883 ******* 2026-02-27 10:05:14,957 p=39824 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2026-02-27 10:05:14,981 p=39824 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-02-27 10:05:14,982 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:14 +0000 (0:00:00.143) 0:23:08.028 ******* 2026-02-27 10:05:14,982 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:14 +0000 (0:00:00.143) 0:23:08.027 ******* 2026-02-27 10:05:20,738 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:20,761 p=39824 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-02-27 10:05:20,761 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:20 +0000 (0:00:05.779) 0:23:13.808 ******* 2026-02-27 10:05:20,762 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:20 +0000 (0:00:05.779) 0:23:13.807 ******* 2026-02-27 10:05:20,917 p=39824 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2026-02-27 10:05:20,933 p=39824 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-02-27 10:05:20,933 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:20 +0000 (0:00:00.171) 0:23:13.979 ******* 2026-02-27 10:05:20,933 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:20 +0000 (0:00:00.171) 0:23:13.978 ******* 2026-02-27 10:05:27,249 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:27,296 p=39824 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 10:05:27,296 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:06.363) 0:23:20.342 ******* 2026-02-27 10:05:27,297 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:06.363) 0:23:20.342 ******* 2026-02-27 10:05:27,376 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:27,390 p=39824 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 10:05:27,390 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.094) 0:23:20.437 ******* 2026-02-27 10:05:27,391 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.093) 0:23:20.436 ******* 2026-02-27 10:05:27,501 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:27,531 p=39824 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-02-27 10:05:27,531 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.140) 0:23:20.577 ******* 2026-02-27 10:05:27,531 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.140) 0:23:20.576 ******* 2026-02-27 10:05:27,628 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:27,691 p=39824 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-02-27 10:05:27,691 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.159) 0:23:20.737 ******* 2026-02-27 10:05:27,691 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.159) 0:23:20.736 ******* 2026-02-27 10:05:27,809 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:27,855 p=39824 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-02-27 10:05:27,855 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.164) 0:23:20.901 ******* 2026-02-27 10:05:27,855 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.164) 0:23:20.900 ******* 2026-02-27 10:05:27,938 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:27,951 p=39824 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2026-02-27 10:05:27,951 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.095) 0:23:20.997 ******* 2026-02-27 10:05:27,951 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:27 +0000 (0:00:00.095) 0:23:20.996 ******* 2026-02-27 10:05:28,043 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:28,062 p=39824 u=zuul n=ansible | TASK [tempest : Ensure podman is installed name=podman, state=present] ********* 2026-02-27 10:05:28,062 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:28 +0000 (0:00:00.110) 0:23:21.108 ******* 2026-02-27 10:05:28,062 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:28 +0000 (0:00:00.110) 0:23:21.107 ******* 2026-02-27 10:05:30,413 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:30,424 p=39824 u=zuul n=ansible | TASK [tempest : Create tempest directories path={{ cifmw_tempest_artifacts_basedir }}, state=directory, mode=0755] *** 2026-02-27 10:05:30,424 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:02.361) 0:23:23.470 ******* 2026-02-27 10:05:30,424 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:02.362) 0:23:23.469 ******* 2026-02-27 10:05:30,664 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:30,679 p=39824 u=zuul n=ansible | TASK [tempest : Setup tempest tests _raw_params=tempest-tests.yml] ************* 2026-02-27 10:05:30,679 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.255) 0:23:23.725 ******* 2026-02-27 10:05:30,679 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.255) 0:23:23.724 ******* 2026-02-27 10:05:30,718 p=39824 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/tempest-tests.yml for localhost 2026-02-27 10:05:30,735 p=39824 u=zuul n=ansible | TASK [tempest : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2026-02-27 10:05:30,736 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.056) 0:23:23.782 ******* 2026-02-27 10:05:30,736 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.056) 0:23:23.781 ******* 2026-02-27 10:05:30,774 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:30,784 p=39824 u=zuul n=ansible | TASK [tempest : Get list of tests to be executed yaml_file={{ cifmw_tempest_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_tempest_default_groups }}, job={{ cifmw_tempest_job_name | default(omit) }}] *** 2026-02-27 10:05:30,784 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.048) 0:23:23.830 ******* 2026-02-27 10:05:30,784 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.048) 0:23:23.829 ******* 2026-02-27 10:05:30,819 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:30,829 p=39824 u=zuul n=ansible | TASK [tempest : Creating include.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/include.txt, content={% for test in list_allowed.allowed_tests %}{{ test }} {% endfor %}] *** 2026-02-27 10:05:30,829 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.044) 0:23:23.875 ******* 2026-02-27 10:05:30,829 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.044) 0:23:23.874 ******* 2026-02-27 10:05:30,862 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:30,900 p=39824 u=zuul n=ansible | TASK [tempest : Show tests to be executed msg={{ list_allowed }}] ************** 2026-02-27 10:05:30,901 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.071) 0:23:23.947 ******* 2026-02-27 10:05:30,901 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.071) 0:23:23.946 ******* 2026-02-27 10:05:30,942 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:30,959 p=39824 u=zuul n=ansible | TASK [tempest : Copy list_skipped to artifacts dir mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml] *** 2026-02-27 10:05:30,959 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.058) 0:23:24.005 ******* 2026-02-27 10:05:30,959 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:30 +0000 (0:00:00.058) 0:23:24.004 ******* 2026-02-27 10:05:31,442 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:31,460 p=39824 u=zuul n=ansible | TASK [tempest : Get list of tests to be excluded yaml_file={{ cifmw_tempest_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_tempest_default_jobs }}] *** 2026-02-27 10:05:31,460 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:31 +0000 (0:00:00.501) 0:23:24.506 ******* 2026-02-27 10:05:31,461 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:31 +0000 (0:00:00.501) 0:23:24.506 ******* 2026-02-27 10:05:31,938 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:31,958 p=39824 u=zuul n=ansible | TASK [tempest : Creating exclude.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/exclude.txt, content={% for test in list_skipped.skipped_tests %}{{ test }} {% endfor %}] *** 2026-02-27 10:05:31,959 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:31 +0000 (0:00:00.498) 0:23:25.005 ******* 2026-02-27 10:05:31,959 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:31 +0000 (0:00:00.498) 0:23:25.004 ******* 2026-02-27 10:05:32,405 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:32,428 p=39824 u=zuul n=ansible | TASK [tempest : Show tests to be excluded msg={{ list_skipped.skipped_tests }}] *** 2026-02-27 10:05:32,429 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.470) 0:23:25.475 ******* 2026-02-27 10:05:32,429 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.470) 0:23:25.474 ******* 2026-02-27 10:05:32,478 p=39824 u=zuul n=ansible | ok: [localhost] => msg: - tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_mtu_sized_frames 2026-02-27 10:05:32,500 p=39824 u=zuul n=ansible | TASK [tempest : Creating include.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/include.txt, content={% for test in cifmw_tempest_tests_allowed %}{{ test }} {% endfor %}] *** 2026-02-27 10:05:32,500 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.071) 0:23:25.547 ******* 2026-02-27 10:05:32,501 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.071) 0:23:25.546 ******* 2026-02-27 10:05:32,950 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:32,967 p=39824 u=zuul n=ansible | TASK [tempest : Show tests to be executed msg={{ cifmw_tempest_tests_allowed }}] *** 2026-02-27 10:05:32,967 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.466) 0:23:26.013 ******* 2026-02-27 10:05:32,967 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:32 +0000 (0:00:00.466) 0:23:26.012 ******* 2026-02-27 10:05:33,013 p=39824 u=zuul n=ansible | ok: [localhost] => msg: - tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops 2026-02-27 10:05:33,034 p=39824 u=zuul n=ansible | TASK [tempest : Creating exclude.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/exclude.txt, content={% for test in cifmw_tempest_tests_skipped %}{{ test }} {% endfor %}] *** 2026-02-27 10:05:33,034 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.067) 0:23:26.080 ******* 2026-02-27 10:05:33,034 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.067) 0:23:26.079 ******* 2026-02-27 10:05:33,069 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:33,089 p=39824 u=zuul n=ansible | TASK [tempest : Show tests to be excluded msg={{ cifmw_tempest_tests_skipped }}] *** 2026-02-27 10:05:33,089 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.054) 0:23:26.135 ******* 2026-02-27 10:05:33,089 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.054) 0:23:26.134 ******* 2026-02-27 10:05:33,124 p=39824 u=zuul n=ansible | skipping: [localhost] 2026-02-27 10:05:33,146 p=39824 u=zuul n=ansible | TASK [tempest : Create clouds.yaml _raw_params=create-clouds-file.yml] ********* 2026-02-27 10:05:33,147 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.057) 0:23:26.193 ******* 2026-02-27 10:05:33,147 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.057) 0:23:26.192 ******* 2026-02-27 10:05:33,185 p=39824 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/create-clouds-file.yml for localhost 2026-02-27 10:05:33,219 p=39824 u=zuul n=ansible | TASK [tempest : Get keystone data _raw_params=oc get keystoneapi keystone -n {{ cifmw_openstack_namespace }} -o json] *** 2026-02-27 10:05:33,219 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.072) 0:23:26.265 ******* 2026-02-27 10:05:33,219 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.072) 0:23:26.264 ******* 2026-02-27 10:05:33,670 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:33,692 p=39824 u=zuul n=ansible | TASK [tempest : Set keystone vars keystone_secret_name={{ _keystone_json_content['spec']['secret'] }}, keystone_passwd_select={{ _keystone_json_content['spec']['passwordSelectors']['admin'] }}, keystone_api={{ _keystone_json_content['status']['apiEndpoints']['public'] }}] *** 2026-02-27 10:05:33,692 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.472) 0:23:26.738 ******* 2026-02-27 10:05:33,692 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.472) 0:23:26.737 ******* 2026-02-27 10:05:33,734 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:33,756 p=39824 u=zuul n=ansible | TASK [tempest : Get credentials data _raw_params=oc get secret {{ keystone_secret_name }} -n {{ cifmw_openstack_namespace }} -o json] *** 2026-02-27 10:05:33,756 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.063) 0:23:26.802 ******* 2026-02-27 10:05:33,756 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:33 +0000 (0:00:00.063) 0:23:26.801 ******* 2026-02-27 10:05:34,106 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:34,121 p=39824 u=zuul n=ansible | TASK [tempest : Get password data os_password={{ _os_password_data_json_content['data'][keystone_passwd_select] | ansible.builtin.b64decode }}] *** 2026-02-27 10:05:34,121 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.365) 0:23:27.167 ******* 2026-02-27 10:05:34,121 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.365) 0:23:27.166 ******* 2026-02-27 10:05:34,148 p=39824 u=zuul n=ansible | ok: [localhost] 2026-02-27 10:05:34,170 p=39824 u=zuul n=ansible | TASK [tempest : Get clouds.yaml src=clouds.yaml.j2, dest={{ cifmw_tempest_artifacts_basedir }}/clouds.yaml, mode=0644] *** 2026-02-27 10:05:34,171 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.049) 0:23:27.217 ******* 2026-02-27 10:05:34,171 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.049) 0:23:27.216 ******* 2026-02-27 10:05:34,637 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:34,660 p=39824 u=zuul n=ansible | TASK [tempest : Configure tempest _raw_params=configure-tempest.yml] *********** 2026-02-27 10:05:34,660 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.489) 0:23:27.706 ******* 2026-02-27 10:05:34,660 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.489) 0:23:27.705 ******* 2026-02-27 10:05:34,717 p=39824 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/configure-tempest.yml for localhost 2026-02-27 10:05:34,756 p=39824 u=zuul n=ansible | TASK [tempest : Create profile.yaml file content={{ _cifmw_tempest_tempestconf_profile_content | to_nice_yaml }}, dest={{ cifmw_tempest_artifacts_basedir }}/profile.yaml, mode=0644] *** 2026-02-27 10:05:34,757 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.096) 0:23:27.803 ******* 2026-02-27 10:05:34,757 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:34 +0000 (0:00:00.096) 0:23:27.802 ******* 2026-02-27 10:05:35,261 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:35,275 p=39824 u=zuul n=ansible | TASK [tempest : Copy CA bundle to cifmw_tempest_artifacts_basedir src=/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem, dest={{ cifmw_tempest_artifacts_basedir }}, mode=0444, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, remote_src=True] *** 2026-02-27 10:05:35,275 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.518) 0:23:28.322 ******* 2026-02-27 10:05:35,276 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.518) 0:23:28.321 ******* 2026-02-27 10:05:35,524 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:35,543 p=39824 u=zuul n=ansible | TASK [tempest : Set proper permission for tempest directory _raw_params=podman unshare chown 42480:42480 -R {{ cifmw_tempest_artifacts_basedir }}] *** 2026-02-27 10:05:35,543 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.267) 0:23:28.589 ******* 2026-02-27 10:05:35,543 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.267) 0:23:28.588 ******* 2026-02-27 10:05:35,916 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:35,934 p=39824 u=zuul n=ansible | TASK [tempest : Ensure we have tempest container image name={{ cifmw_tempest_image }}:{{ cifmw_tempest_image_tag }}] *** 2026-02-27 10:05:35,934 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.390) 0:23:28.980 ******* 2026-02-27 10:05:35,934 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:35 +0000 (0:00:00.390) 0:23:28.979 ******* 2026-02-27 10:05:45,087 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:05:45,102 p=39824 u=zuul n=ansible | TASK [tempest : Run tempest name=tempest, image={{ cifmw_tempest_image }}:{{ cifmw_tempest_image_tag }}, state=started, auto_remove={{ cifmw_tempest_remove_container }}, network=host, volume=['{{ cifmw_tempest_artifacts_basedir }}/:/var/lib/tempest/external_files:Z', '{{ cifmw_tempest_artifacts_basedir }}/tls-ca-bundle.pem:/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem:Z'], detach=False, dns={{ cifmw_tempest_dns_servers }}, env={'CONCURRENCY': '{{ cifmw_tempest_concurrency | default(omit) }}'}] *** 2026-02-27 10:05:45,102 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:45 +0000 (0:00:09.168) 0:23:38.148 ******* 2026-02-27 10:05:45,102 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:05:45 +0000 (0:00:09.168) 0:23:38.147 ******* 2026-02-27 10:07:15,131 p=39824 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false msg: Container tempest exited with code 1 when runed stderr: "+ RETURN_VALUE=0\n+ HOMEDIR=/var/lib/tempest\n+ TEMPEST_PATH=/var/lib/tempest/\n+ TEMPEST_DIR=/var/lib/tempest/openshift\n+ CONCURRENCY=4\n+ TEMPESTCONF_ARGS=\n+ TEMPEST_ARGS=\n+ TEMPEST_DEBUG_MODE=false\n+ TEMPEST_CLEANUP=false\n+ RERUN_FAILED_TESTS=false\n+ RERUN_OVERRIDE_STATUS=false\n+ TEMPEST_EXPECTED_FAILURES_LIST=/dev/null\n+ '[' false == true ']'\n+ [[ -z '' ]]\n+ TEMPEST_WORKFLOW_STEP_DIR_NAME=tempest\n+ [[ ! -z true ]]\n+ TEMPEST_PATH=/var/lib/tempest/external_files/\n+ TEMPEST_LOGS_DIR=/var/lib/tempest/external_files//tempest/\n+ FAILED_TESTS_FILE=/var/lib/tempest/external_files//tempest//stestr_failing.txt\n+ [[ true == true ]]\n+ TEMPESTCONF_ARGS+='--create '\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ true == true ]]\n+ TEMPESTCONF_ARGS+='--debug '\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n++ echo\n++ tr '\\n' ' '\n+ TEMPESTCONF_OVERRIDES=' identity.v3_endpoint_type public '\n+ TEMPESTCONF_OVERRIDES+='DEFAULT.log_dir /var/lib/tempest/external_files//tempest/ '\n+ [[ ! -z '' ]]\n+ TEMPEST_EXTERNAL_PLUGIN_GIT_URL=\n+ TEMPEST_EXTERNAL_PLUGIN_CHANGE_URL=\n+ TEMPEST_EXTERNAL_PLUGIN_REFSPEC=\n+ TEMPEST_EXTERNAL_PLUGIN_DIR=/var/lib/tempest/external-plugins\n+ VENV_DIR=/var/lib/tempest/external-plugins/.venv\n+ TEMPEST_EXTRA_RPMS=\n+ TEMPEST_EXTRA_IMAGES_URL=\n+ TEMPEST_EXTRA_IMAGES_DISK_FORMAT=\n+ TEMPEST_EXTRA_IMAGES_OS_CLOUD=\n+ TEMPEST_EXTRA_IMAGES_ID=\n+ TEMPEST_EXTRA_IMAGES_NAME=\n+ TEMPEST_EXTRA_IMAGES_CONTAINER_FORMAT=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_ID=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_RAM=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_DISK=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_VCPUS=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_NAME=\n+ TEMPEST_EXTRA_IMAGES_FLAVOR_OS_CLOUD=\n+ TEMPEST_EXTRA_IMAGES_CREATE_TIMEOUT=\n+ OLD_IFS=' \t\n'\n+ IFS=,\n+ read -ra TEMPEST_EXTERNAL_PLUGIN_GIT_URL\n+ read -ra TEMPEST_EXTERNAL_PLUGIN_CHANGE_URL\n+ read -ra TEMPEST_EXTERNAL_PLUGIN_REFSPEC\n+ read -ra TEMPEST_EXTRA_RPMS\n+ read -ra TEMPEST_EXTRA_IMAGES_URL\n+ read -ra TEMPEST_EXTRA_IMAGES_DISK_FORMAT\n+ read -ra TEMPEST_EXTRA_IMAGES_OS_CLOUD\n+ read -ra TEMPEST_EXTRA_IMAGES_ID\n+ read -ra TEMPEST_EXTRA_IMAGES_NAME\n+ read -ra TEMPEST_EXTRA_IMAGES_CONTAINER_FORMAT\n+ read -ra TEMPEST_EXTRA_IMAGES_CREATE_TIMEOUT\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_ID\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_RAM\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_DISK\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_VCPUS\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_NAME\n+ read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_OS_CLOUD\n+ IFS=' \t\n'\n+ [[ '' == true ]]\n+ [[ '' == true ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ [[ -z '' ]]\n+ TEMPEST_ARGS+='--include-list /var/lib/tempest/external_files//include.txt '\n+ [[ -z '' ]]\n+ TEMPEST_ARGS+='--exclude-list /var/lib/tempest/external_files//exclude.txt '\n+ [[ ! -z '' ]]\n+ [[ ! -z '' ]]\n+ '[' -n 4 ']'\n+ '[' -z '' ']'\n+ TEMPEST_ARGS+='--concurrency 4 '\n+ export OS_CLOUD=default\n+ OS_CLOUD=default\n+ '[' '!' -z true ']'\n+ '[' -e /var/lib/tempest/external_files//clouds.yaml ']'\n+ mkdir -p /var/lib/tempest/.config/openstack\n+ cp /var/lib/tempest/external_files//clouds.yaml /var/lib/tempest/.config/openstack/clouds.yaml\n+ '[' -f /var/lib/tempest/external_files//profile.yaml ']'\n+ '[' -z '' ']'\n+ TEMPESTCONF_ARGS+='--profile /var/lib/tempest/external_files//profile.yaml '\n+ '[' '!' -f /var/lib/tempest/external_files//include.txt ']'\n+ '[' '!' -f /var/lib/tempest/external_files//exclude.txt ']'\n+ whitebox_neutron_tempest_plugin_workaround\n+ '[' -f /var/lib/tempest/id_ecdsa ']'\n+ '[' -z '' ']'\n+ run_rpm_tempest\n+ '[' 0 -ne 0 ']'\n+ rpm -qa\n+ grep tempest\n+ run_tempest\n+ pushd /var/lib/tempest\n+ tempest init openshift\n+ pushd /var/lib/tempest/openshift\n+ prepare_tempest_cleanup\n+ [[ false == true ]]\n+ upload_extra_images\n+ [[ -n '' ]]\n+ mkdir -p /var/lib/tempest/external_files//tempest/\n+ discover_tempest_config --create --debug --profile /var/lib/tempest/external_files//profile.yaml identity.v3_endpoint_type public DEFAULT.log_dir /var/lib/tempest/external_files//tempest/\n+ cat\n+ xargs discover-tempest-config\n/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1018: InsecureRequestWarning: Unverified HTTPS request is being made to host 'keystone-public-openstack.apps-crc.testing'. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings\n \ warnings.warn(\n+ tempest run --include-list /var/lib/tempest/external_files//include.txt --exclude-list /var/lib/tempest/external_files//exclude.txt --concurrency 4\n\nNo tests were successful during the run\n+ RETURN_VALUE=1\n+ run_tempest_cleanup\n+ [[ false == true ]]\n+ popd\n+ popd\n+ print_config_files\n+ echo 'Excluded tests'\n+ '[' '!' -z '' ']'\n+ echo 'Included tests'\n+ '[' '!' -z '' ']'\n+ save_config_files\n+ mkdir -p /var/lib/tempest/external_files//tempest//etc\n+ cp -f '' /var/lib/tempest/external_files//tempest//etc\ncp: cannot stat '': No such file or directory\n+ cp -f '' /var/lib/tempest/external_files//tempest//etc\ncp: cannot stat '': No such file or directory\n+ cp -f /dev/null /var/lib/tempest/external_files//tempest//etc\n+ cp -f /var/lib/tempest/openshift/etc/tempest.conf '/var/lib/tempest/openshift/etc/*.ini' '/var/lib/tempest/openshift/etc/*.txt' /var/lib/tempest/openshift/etc/allow-list.yaml /var/lib/tempest/external_files//tempest//etc\ncp: cannot stat '/var/lib/tempest/openshift/etc/*.ini': No such file or directory\ncp: cannot stat '/var/lib/tempest/openshift/etc/*.txt': No such file or directory\n+ cp -f /var/lib/tempest/openshift/.stestr.conf /var/lib/tempest/external_files//tempest//stestr.conf\n+ tar -czf /var/lib/tempest/external_files//tempest//stestr.tar.gz -C /var/lib/tempest/openshift .stestr\n+ move_tempest_log tempest_results.log\n+ _FILENAME=tempest_results.log\n+ mv /var/lib/tempest/external_files//tempest//tempest.log /var/lib/tempest/external_files//tempest//tempest_results.log\nmv: cannot stat '/var/lib/tempest/external_files//tempest//tempest.log': No such file or directory\n+ generate_test_results tempest_results\n+ _FILENAME=tempest_results\n+ _SUBUNIT_FILE=/var/lib/tempest/external_files//tempest//tempest_results.subunit\n+ _RESULTS_XML=/var/lib/tempest/external_files//tempest//tempest_results.xml\n+ _RESULTS_HTML=/var/lib/tempest/external_files//tempest//tempest_results.html\n+ pushd /var/lib/tempest/openshift\n+ echo 'Generate file containing failing tests'\n+ stestr failing --list\n+ sed 's/\\[.*\\]//g'\n+ echo 'Generate subunit, then xml and html results'\n+ stestr last --subunit\n+ subunit2junitxml /var/lib/tempest/external_files//tempest//tempest_results.subunit -o /var/lib/tempest/external_files//tempest//tempest_results.xml\n+ subunit2html /var/lib/tempest/external_files//tempest//tempest_results.subunit /var/lib/tempest/external_files//tempest//tempest_results.html\n+ popd\n+ rerun_failed_tests\n+ '[' false = false ']'\n+ return 1\n+ check_expected_failures\n+ '[' -s /var/lib/tempest/external_files//tempest//stestr_failing.txt ']'\n+ '[' -s /dev/null ']'\n+ '[' false == true ']'\n+ exit 1\n" stderr_lines: - + RETURN_VALUE=0 - + HOMEDIR=/var/lib/tempest - + TEMPEST_PATH=/var/lib/tempest/ - + TEMPEST_DIR=/var/lib/tempest/openshift - + CONCURRENCY=4 - + TEMPESTCONF_ARGS= - + TEMPEST_ARGS= - + TEMPEST_DEBUG_MODE=false - + TEMPEST_CLEANUP=false - + RERUN_FAILED_TESTS=false - + RERUN_OVERRIDE_STATUS=false - + TEMPEST_EXPECTED_FAILURES_LIST=/dev/null - + '[' false == true ']' - + [[ -z '' ]] - + TEMPEST_WORKFLOW_STEP_DIR_NAME=tempest - + [[ ! -z true ]] - + TEMPEST_PATH=/var/lib/tempest/external_files/ - + TEMPEST_LOGS_DIR=/var/lib/tempest/external_files//tempest/ - + FAILED_TESTS_FILE=/var/lib/tempest/external_files//tempest//stestr_failing.txt - + [[ true == true ]] - + TEMPESTCONF_ARGS+='--create ' - + [[ '' == true ]] - + [[ '' == true ]] - + [[ '' == true ]] - + [[ true == true ]] - + TEMPESTCONF_ARGS+='--debug ' - + [[ '' == true ]] - + [[ '' == true ]] - + [[ '' == true ]] - + [[ '' == true ]] - + [[ '' == true ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - ++ echo - ++ tr '\n' ' ' - + TEMPESTCONF_OVERRIDES=' identity.v3_endpoint_type public ' - + TEMPESTCONF_OVERRIDES+='DEFAULT.log_dir /var/lib/tempest/external_files//tempest/ ' - + [[ ! -z '' ]] - + TEMPEST_EXTERNAL_PLUGIN_GIT_URL= - + TEMPEST_EXTERNAL_PLUGIN_CHANGE_URL= - + TEMPEST_EXTERNAL_PLUGIN_REFSPEC= - + TEMPEST_EXTERNAL_PLUGIN_DIR=/var/lib/tempest/external-plugins - + VENV_DIR=/var/lib/tempest/external-plugins/.venv - + TEMPEST_EXTRA_RPMS= - + TEMPEST_EXTRA_IMAGES_URL= - + TEMPEST_EXTRA_IMAGES_DISK_FORMAT= - + TEMPEST_EXTRA_IMAGES_OS_CLOUD= - + TEMPEST_EXTRA_IMAGES_ID= - + TEMPEST_EXTRA_IMAGES_NAME= - + TEMPEST_EXTRA_IMAGES_CONTAINER_FORMAT= - + TEMPEST_EXTRA_IMAGES_FLAVOR_ID= - + TEMPEST_EXTRA_IMAGES_FLAVOR_RAM= - + TEMPEST_EXTRA_IMAGES_FLAVOR_DISK= - + TEMPEST_EXTRA_IMAGES_FLAVOR_VCPUS= - + TEMPEST_EXTRA_IMAGES_FLAVOR_NAME= - + TEMPEST_EXTRA_IMAGES_FLAVOR_OS_CLOUD= - + TEMPEST_EXTRA_IMAGES_CREATE_TIMEOUT= - "+ OLD_IFS=' \t" - '''' - + IFS=, - + read -ra TEMPEST_EXTERNAL_PLUGIN_GIT_URL - + read -ra TEMPEST_EXTERNAL_PLUGIN_CHANGE_URL - + read -ra TEMPEST_EXTERNAL_PLUGIN_REFSPEC - + read -ra TEMPEST_EXTRA_RPMS - + read -ra TEMPEST_EXTRA_IMAGES_URL - + read -ra TEMPEST_EXTRA_IMAGES_DISK_FORMAT - + read -ra TEMPEST_EXTRA_IMAGES_OS_CLOUD - + read -ra TEMPEST_EXTRA_IMAGES_ID - + read -ra TEMPEST_EXTRA_IMAGES_NAME - + read -ra TEMPEST_EXTRA_IMAGES_CONTAINER_FORMAT - + read -ra TEMPEST_EXTRA_IMAGES_CREATE_TIMEOUT - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_ID - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_RAM - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_DISK - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_VCPUS - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_NAME - + read -ra TEMPEST_EXTRA_IMAGES_FLAVOR_OS_CLOUD - "+ IFS=' \t" - '''' - + [[ '' == true ]] - + [[ '' == true ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + [[ -z '' ]] - + TEMPEST_ARGS+='--include-list /var/lib/tempest/external_files//include.txt ' - + [[ -z '' ]] - + TEMPEST_ARGS+='--exclude-list /var/lib/tempest/external_files//exclude.txt ' - + [[ ! -z '' ]] - + [[ ! -z '' ]] - + '[' -n 4 ']' - + '[' -z '' ']' - + TEMPEST_ARGS+='--concurrency 4 ' - + export OS_CLOUD=default - + OS_CLOUD=default - + '[' '!' -z true ']' - + '[' -e /var/lib/tempest/external_files//clouds.yaml ']' - + mkdir -p /var/lib/tempest/.config/openstack - + cp /var/lib/tempest/external_files//clouds.yaml /var/lib/tempest/.config/openstack/clouds.yaml - + '[' -f /var/lib/tempest/external_files//profile.yaml ']' - + '[' -z '' ']' - + TEMPESTCONF_ARGS+='--profile /var/lib/tempest/external_files//profile.yaml ' - + '[' '!' -f /var/lib/tempest/external_files//include.txt ']' - + '[' '!' -f /var/lib/tempest/external_files//exclude.txt ']' - + whitebox_neutron_tempest_plugin_workaround - + '[' -f /var/lib/tempest/id_ecdsa ']' - + '[' -z '' ']' - + run_rpm_tempest - + '[' 0 -ne 0 ']' - + rpm -qa - + grep tempest - + run_tempest - + pushd /var/lib/tempest - + tempest init openshift - + pushd /var/lib/tempest/openshift - + prepare_tempest_cleanup - + [[ false == true ]] - + upload_extra_images - + [[ -n '' ]] - + mkdir -p /var/lib/tempest/external_files//tempest/ - + discover_tempest_config --create --debug --profile /var/lib/tempest/external_files//profile.yaml identity.v3_endpoint_type public DEFAULT.log_dir /var/lib/tempest/external_files//tempest/ - + cat - + xargs discover-tempest-config - '/usr/lib/python3.9/site-packages/urllib3/connectionpool.py:1018: InsecureRequestWarning: Unverified HTTPS request is being made to host ''keystone-public-openstack.apps-crc.testing''. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings' - ' warnings.warn(' - + tempest run --include-list /var/lib/tempest/external_files//include.txt --exclude-list /var/lib/tempest/external_files//exclude.txt --concurrency 4 - '' - No tests were successful during the run - + RETURN_VALUE=1 - + run_tempest_cleanup - + [[ false == true ]] - + popd - + popd - + print_config_files - + echo 'Excluded tests' - + '[' '!' -z '' ']' - + echo 'Included tests' - + '[' '!' -z '' ']' - + save_config_files - + mkdir -p /var/lib/tempest/external_files//tempest//etc - + cp -f '' /var/lib/tempest/external_files//tempest//etc - 'cp: cannot stat '''': No such file or directory' - + cp -f '' /var/lib/tempest/external_files//tempest//etc - 'cp: cannot stat '''': No such file or directory' - + cp -f /dev/null /var/lib/tempest/external_files//tempest//etc - + cp -f /var/lib/tempest/openshift/etc/tempest.conf '/var/lib/tempest/openshift/etc/*.ini' '/var/lib/tempest/openshift/etc/*.txt' /var/lib/tempest/openshift/etc/allow-list.yaml /var/lib/tempest/external_files//tempest//etc - 'cp: cannot stat ''/var/lib/tempest/openshift/etc/*.ini'': No such file or directory' - 'cp: cannot stat ''/var/lib/tempest/openshift/etc/*.txt'': No such file or directory' - + cp -f /var/lib/tempest/openshift/.stestr.conf /var/lib/tempest/external_files//tempest//stestr.conf - + tar -czf /var/lib/tempest/external_files//tempest//stestr.tar.gz -C /var/lib/tempest/openshift .stestr - + move_tempest_log tempest_results.log - + _FILENAME=tempest_results.log - + mv /var/lib/tempest/external_files//tempest//tempest.log /var/lib/tempest/external_files//tempest//tempest_results.log - 'mv: cannot stat ''/var/lib/tempest/external_files//tempest//tempest.log'': No such file or directory' - + generate_test_results tempest_results - + _FILENAME=tempest_results - + _SUBUNIT_FILE=/var/lib/tempest/external_files//tempest//tempest_results.subunit - + _RESULTS_XML=/var/lib/tempest/external_files//tempest//tempest_results.xml - + _RESULTS_HTML=/var/lib/tempest/external_files//tempest//tempest_results.html - + pushd /var/lib/tempest/openshift - + echo 'Generate file containing failing tests' - + stestr failing --list - + sed 's/\[.*\]//g' - + echo 'Generate subunit, then xml and html results' - + stestr last --subunit - + subunit2junitxml /var/lib/tempest/external_files//tempest//tempest_results.subunit -o /var/lib/tempest/external_files//tempest//tempest_results.xml - + subunit2html /var/lib/tempest/external_files//tempest//tempest_results.subunit /var/lib/tempest/external_files//tempest//tempest_results.html - + popd - + rerun_failed_tests - + '[' false = false ']' - + return 1 - + check_expected_failures - + '[' -s /var/lib/tempest/external_files//tempest//stestr_failing.txt ']' - + '[' -s /dev/null ']' - + '[' false == true ']' - + exit 1 stdout: "python3-tempest-41.0.0-0.20250124132801.a25e0df.el9.noarch\npython3-tempestconf-3.5.3-0.20260212202715.8e33668.el9.noarch\nopenstack-tempest-41.0.0-0.20250124132801.a25e0df.el9.noarch\n~ /\n2026-02-27 10:05:46.690 9 INFO tempest [-] Using tempest config file /etc/tempest/tempest.conf\e[00m\n~/openshift ~ /\n2026-02-27 10:05:47.278 13 INFO tempest [-] Using tempest config file /var/lib/tempest/openshift/etc/tempest.conf\e[00m\n2026-02-27 10:05:47.298 13 DEBUG config_tempest.constants [-] Setting basic default values load_basic_defaults /usr/lib/python3.9/site-packages/config_tempest/main.py:80\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] debug = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] use_stderr = false set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] log_file = tempest.log set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] username = demo_tempestconf set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] password = secrete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] project_name = demo set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_username = alt_demo_tempestconf set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_password = secrete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_project_name = alt_demo set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] tempest_roles = member set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_username = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_name = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [object-storage] reseller_admin_role = ResellerAdmin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [oslo-concurrency] lock_path = /tmp set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] preserve_ports = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [network-feature-enabled] ipv6_subnet_attributes = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [scenario] dhcp_client = dhcpcd set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [image] image_path = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_username = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_name = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_password = 12345678 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] uri = https://keystone-public-openstack.apps-crc.testing set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] region = regionOne set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] dhcp_domain = set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] v3_endpoint_type = public set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [volume] catalog_type = volumev3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] uri_v3 = https://keystone-public-openstack.apps-crc.testing set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.339 13 DEBUG config_tempest.constants [-] Setting [identity] disable_ssl_certificate_validation = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.340 13 DEBUG config_tempest.constants [-] Setting [identity] uri_v3 = https://keystone-public-openstack.apps-crc.testing/v3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.763 13 INFO tempest.lib.common.rest_client [req-467962fc-d8d5-43e2-b67b-bc57c6a89446 req-467962fc-d8d5-43e2-b67b-bc57c6a89446 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.423s\e[00m\n2026-02-27 10:05:47.855 13 INFO tempest.lib.common.rest_client [req-242f46b2-ecb4-4722-84b4-88f78ab98b4b req-242f46b2-ecb4-4722-84b4-88f78ab98b4b ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.091s\e[00m\n2026-02-27 10:05:47.855 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_id = 2cea3ad047234d1aa6686e8d6e78bc8f set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:47.856 13 INFO config_tempest.constants [-] Creating user 'demo_tempestconf' with project 'demo' and password 'secrete'\e[00m\n2026-02-27 10:05:48.702 13 INFO tempest.lib.common.rest_client [req-0ee4a782-80c1-450d-bd4f-08c4ee9f0269 req-0ee4a782-80c1-450d-bd4f-08c4ee9f0269 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/projects 0.844s\e[00m\n2026-02-27 10:05:48.856 13 INFO tempest.lib.common.rest_client [req-b6f5fba0-a513-4802-b3ce-2701a9880d39 req-b6f5fba0-a513-4802-b3ce-2701a9880d39 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.153s\e[00m\n2026-02-27 10:05:49.512 13 INFO tempest.lib.common.rest_client [req-0156e999-4275-4709-86ff-7703aeedac79 req-0156e999-4275-4709-86ff-7703aeedac79 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/users 0.655s\e[00m\n2026-02-27 10:05:49.512 13 INFO config_tempest.constants [-] Creating user 'alt_demo_tempestconf' with project 'alt_demo' and password 'secrete'\e[00m\n2026-02-27 10:05:49.672 13 INFO tempest.lib.common.rest_client [req-36564652-e215-453a-b935-339432439cda req-36564652-e215-453a-b935-339432439cda ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/projects 0.159s\e[00m\n2026-02-27 10:05:49.785 13 INFO tempest.lib.common.rest_client [req-482040fb-ca34-41d1-ab70-45c5ee594b3f req-482040fb-ca34-41d1-ab70-45c5ee594b3f ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.112s\e[00m\n2026-02-27 10:05:50.313 13 INFO tempest.lib.common.rest_client [req-e68fa105-cca1-4c1e-b88a-6aa09dc7d976 req-e68fa105-cca1-4c1e-b88a-6aa09dc7d976 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/users 0.527s\e[00m\n2026-02-27 10:05:50.410 13 INFO tempest.lib.common.rest_client [req-8f87952b-df10-434e-ba7f-2a9dd1bc5e93 req-8f87952b-df10-434e-ba7f-2a9dd1bc5e93 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.097s\e[00m\n2026-02-27 10:05:50.498 13 INFO tempest.lib.common.rest_client [req-eecfb7d1-4e78-4540-98a7-aa56166e4c4f req-eecfb7d1-4e78-4540-98a7-aa56166e4c4f ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/users 0.087s\e[00m\n2026-02-27 10:05:50.581 13 INFO tempest.lib.common.rest_client [req-a609805d-4ae2-4a15-afb6-2d4f3a72e5ac req-a609805d-4ae2-4a15-afb6-2d4f3a72e5ac ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/roles 0.083s\e[00m\n2026-02-27 10:05:50.666 13 INFO tempest.lib.common.rest_client [req-1881354e-43ac-43f5-8ca4-15ced670c3b9 req-1881354e-43ac-43f5-8ca4-15ced670c3b9 ] Request (main): 204 PUT https://keystone-public-openstack.apps-crc.testing/v3/projects/a6aeab59106149ae9483915683320e2c/users/6f45f8c2cdbb40fa9184357666661d9f/roles/afba8a77e60e4ccb9fa5365b8cc8278b 0.084s\e[00m\n2026-02-27 10:05:50.667 13 DEBUG config_tempest.constants [-] User 'admin' was given the 'admin' role in project 'demo' give_role_to_user /usr/lib/python3.9/site-packages/config_tempest/users.py:106\e[00m\n2026-02-27 10:05:50.766 13 INFO tempest.lib.common.rest_client [req-3ff2915c-2f34-4cc9-bc7d-98ec7f331355 req-3ff2915c-2f34-4cc9-bc7d-98ec7f331355 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/services 0.098s\e[00m\n2026-02-27 10:05:51.343 13 DEBUG config_tempest.constants [-] Setting [service_available] aodh = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.344 13 DEBUG config_tempest.constants [-] Setting [service_available] ironic = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.344 13 DEBUG config_tempest.constants [-] Setting [service_available] ceilometer = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.381 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] console_output = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.811 13 INFO tempest.lib.common.rest_client [req-5d4ca1ea-c04b-4222-a0e4-b4933f60fd7e req-5d4ca1ea-c04b-4222-a0e4-b4933f60fd7e ] Request (main): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/os-hosts 0.429s\e[00m\n2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] min_compute_nodes = 1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] min_microversion = 2.1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] max_microversion = 2.95 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [service_available] nova = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [service_available] sahara = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] trove = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] designate = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] panko = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:51.865 13 DEBUG config_tempest.constants [-] Setting [identity] auth_version = v3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.611 13 INFO tempest.lib.common.rest_client [req-8b423317-db14-4ec3-a216-ed17a02a52f3 req-8b423317-db14-4ec3-a216-ed17a02a52f3 ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/info/stores 0.718s\e[00m\n2026-02-27 10:05:52.612 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] import_image = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.612 13 DEBUG config_tempest.constants [-] Setting [validation] image_ssh_user = cirros set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.881 13 INFO tempest.lib.common.rest_client [req-efb594e8-28a7-43fb-8668-5af956e47eef req-efb594e8-28a7-43fb-8668-5af956e47eef ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.269s\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [image] http_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [image] http_qcow2_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] glance = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] barbican = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] zaqar = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] gnocchi = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.171 13 DEBUG config_tempest.constants [-] Setting [service_available] neutron = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.462 13 INFO tempest.lib.common.rest_client [tx0481acb743d14ddbb3ee8-0069a16c81 tx0481acb743d14ddbb3ee8-0069a16c81 ] Request (main): 200 GET https://swift-public-openstack.apps-crc.testing/healthcheck 0.044s\e[00m\n2026-02-27 10:05:53.540 13 INFO tempest.lib.common.rest_client [req-c6547752-30e7-4bc3-8ee8-fad995fe4ca8 req-c6547752-30e7-4bc3-8ee8-fad995fe4ca8 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/roles 0.077s\e[00m\n2026-02-27 10:05:53.541 13 INFO config_tempest.constants [-] Creating ResellerAdmin role\e[00m\n2026-02-27 10:05:53.645 13 INFO tempest.lib.common.rest_client [req-ddd5130b-dbb2-402f-a4cf-a63cd5fe416e req-ddd5130b-dbb2-402f-a4cf-a63cd5fe416e ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/roles 0.104s\e[00m\n2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [object-storage] operator_role = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [service_available] swift = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [service_available] octavia = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.647 13 DEBUG config_tempest.constants [-] Setting [service_available] heat = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.696 13 DEBUG config_tempest.constants [-] Setting [placement] min_microversion = 1.0 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [placement] max_microversion = 1.39 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] placement = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] manila = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] manila = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] ceilometer = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.002 13 DEBUG config_tempest.constants [-] Setting [volume] min_microversion = 3.0 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.003 13 DEBUG config_tempest.constants [-] Setting [volume] max_microversion = 3.70 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] cinder = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] watcher = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] mistral = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] mistral = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.497 13 INFO tempest.lib.common.rest_client [req-715b073e-6928-47e7-9976-df2b811f2e98 req-715b073e-6928-47e7-9976-df2b811f2e98 ] Request (main): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.227s\e[00m\n2026-02-27 10:05:54.499 13 DEBUG config_tempest.constants [-] Setting [volume] volume_size = 1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.499 13 INFO config_tempest.constants [-] Creating flavor 'm1.nano'\e[00m\n2026-02-27 10:05:54.649 13 INFO tempest.lib.common.rest_client [req-1b438b36-1f8c-432a-9ad0-912f8ccfe6ac req-1b438b36-1f8c-432a-9ad0-912f8ccfe6ac ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.150s\e[00m\n2026-02-27 10:05:54.948 13 INFO tempest.lib.common.rest_client [req-9dc5a1c2-a7e4-4477-9048-85d2a590632c req-9dc5a1c2-a7e4-4477-9048-85d2a590632c ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92/os-extra_specs 0.296s\e[00m\n2026-02-27 10:05:54.949 13 DEBUG config_tempest.constants [-] Setting [compute] flavor_ref = 3070fbcb-76a6-487a-9634-3b061cf48b92 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:54.949 13 INFO config_tempest.constants [-] Creating flavor 'm1.micro'\e[00m\n2026-02-27 10:05:55.061 13 INFO tempest.lib.common.rest_client [req-fe752339-bacb-482b-9104-ee30dc9a90ce req-fe752339-bacb-482b-9104-ee30dc9a90ce ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.111s\e[00m\n2026-02-27 10:05:55.192 13 INFO tempest.lib.common.rest_client [req-5586f9db-508f-4c71-b1e5-751afddf54be req-5586f9db-508f-4c71-b1e5-751afddf54be ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors/bb1069ce-7573-4853-9a84-0f1fcc548f47/os-extra_specs 0.130s\e[00m\n2026-02-27 10:05:55.193 13 DEBUG config_tempest.constants [-] Setting [compute] flavor_ref_alt = bb1069ce-7573-4853-9a84-0f1fcc548f47 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:05:55.889 13 INFO tempest.lib.common.rest_client [req-c7fd0321-57e6-44d2-a888-8e35ddddc37d req-c7fd0321-57e6-44d2-a888-8e35ddddc37d ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.695s\e[00m\n2026-02-27 10:05:55.890 13 INFO config_tempest.constants [-] Creating image 'cirros-0.6.2-x86_64-disk.img'\e[00m\n2026-02-27 10:05:55.890 13 INFO config_tempest.constants [-] Downloading 'https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img' and saving as '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m\n2026-02-27 10:05:56.450 13 INFO config_tempest.constants [-] Uploading image 'cirros-0.6.2-x86_64-disk.img' from '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m\n2026-02-27 10:05:57.072 13 INFO tempest.lib.common.rest_client [req-366e10a1-fe33-4617-aa63-0edb6cc32558 req-366e10a1-fe33-4617-aa63-0edb6cc32558 ] Request (main): 201 POST https://glance-default-public-openstack.apps-crc.testing/v2/images 0.621s\e[00m\n2026-02-27 10:05:59.029 13 INFO tempest.lib.common.rest_client [req-bf1ce264-9c22-4ef2-ae16-280a5c0f238a req-bf1ce264-9c22-4ef2-ae16-280a5c0f238a ] Request (main): 204 PUT https://glance-default-public-openstack.apps-crc.testing/v2/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2/file 1.956s\e[00m\n2026-02-27 10:05:59.172 13 INFO tempest.lib.common.rest_client [req-737a8e8c-110b-47af-9037-dc28d21d9cd7 req-737a8e8c-110b-47af-9037-dc28d21d9cd7 ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.142s\e[00m\n2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Creating image 'cirros-0.6.2-x86_64-disk.img_alt'\e[00m\n2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Image 'https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img' already fetched to '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'.\e[00m\n2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Uploading image 'cirros-0.6.2-x86_64-disk.img_alt' from '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m\n2026-02-27 10:05:59.968 13 INFO tempest.lib.common.rest_client [req-e93fd113-7b1b-4caf-9af3-ff63cce6ea50 req-e93fd113-7b1b-4caf-9af3-ff63cce6ea50 ] Request (main): 201 POST https://glance-default-public-openstack.apps-crc.testing/v2/images 0.794s\e[00m\n2026-02-27 10:06:01.394 13 INFO tempest.lib.common.rest_client [req-f4830961-0b5e-4dbd-9ee9-c7701c2166bd req-f4830961-0b5e-4dbd-9ee9-c7701c2166bd ] Request (main): 204 PUT https://glance-default-public-openstack.apps-crc.testing/v2/images/0e01d936-f925-4d59-a3f8-91acd33dbd69/file 1.425s\e[00m\n2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [scenario] img_file = /var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [compute] image_ref = 4d0f893f-8072-4a84-9d4b-3757c7f1f1c2 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [compute] image_ref_alt = 0e01d936-f925-4d59-a3f8-91acd33dbd69 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:01.395 13 INFO config_tempest.constants [-] Setting up network\e[00m\n2026-02-27 10:06:01.395 13 INFO config_tempest.constants [-] No network supplied, trying auto discover for an external network while prioritizing the one called public, if not found, the network discovered last will be used.\e[00m\n2026-02-27 10:06:02.138 13 INFO tempest.lib.common.rest_client [req-a0ed029f-bf58-4edd-b510-c528ff842bc4 req-a0ed029f-bf58-4edd-b510-c528ff842bc4 ] Request (main): 200 GET https://neutron-public-openstack.apps-crc.testing/v2.0/networks 0.742s\e[00m\n2026-02-27 10:06:02.139 13 INFO config_tempest.constants [-] Setting ee418dcf-f8c2-433e-89a5-174f0da48e20 as the public network for tempest\e[00m\n2026-02-27 10:06:02.139 13 DEBUG config_tempest.constants [-] Setting [network] public_network_id = ee418dcf-f8c2-433e-89a5-174f0da48e20 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.140 13 DEBUG config_tempest.constants [-] Setting [network] floating_network_name = public set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.311 13 INFO tempest.lib.common.rest_client [req-8aa57119-4d17-4f5d-8696-b93e9caa3f71 req-8aa57119-4d17-4f5d-8696-b93e9caa3f71 ] Request (main): 200 GET https://cinder-public-openstack.apps-crc.testing/v3/os-services?binary=cinder-backup 0.170s\e[00m\n2026-02-27 10:06:02.313 13 DEBUG config_tempest.constants [-] Setting [volume-feature-enabled] backup = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.340 13 DEBUG config_tempest.constants [-] Setting [service_available] horizon = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_v2 = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_v3 = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] api_v1 = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] api_v2 = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_extensions = OS-FEDERATION,OS-OAUTH2,s3tokens,OS-EC2,OS-OAUTH1,OS-PKI,OS-INHERIT,OS-ENDPOINT-POLICY,OS-TRUST,OS-SIMPLE-CERT,OS-EP-FILTER,OS-REVOKE set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [network-feature-enabled] api_extensions = address-group,address-scope,agent,allowed-address-pairs,auto-allocated-topology,availability_zone,default-subnetpools,dhcp_agent_scheduler,dns-integration,dns-domain-ports,dns-integration-domain-keywords,expose-port-forwarding-in-fip,external-net,extra_dhcp_opt,extraroute,filter-validation,floating-ip-port-forwarding-description,floating-ip-port-forwarding-detail,floating-ip-port-forwarding-port-ranges,fip-port-details,flavors,floating-ip-port-forwarding,floatingip-pools,ip_allocation,l2_adjacency,router,ext-gw-mode,logging,multi-provider,net-mtu,net-mtu-writable,network_availability_zone,network-ip-availability,pagination,port-device-profile,port-mac-address-regenerate,port-numa-affinity-policy,port-resource-request,port-resource-request-groups,binding,binding-extended,port-security,project-id,provider,qos,qos-bw-limit-direction,qos-bw-minimum-ingress,qos-default,qos-fip,qos-gateway-ip,qos-port-network-policy,qos-pps-minimum,qos-pps-minimum-rule-alias,qos-pps,qos-rule-type-details,qos-rule-type-filter,qos-rules-alias,quota-check-limit,quotas,quota_details,rbac-policies,rbac-address-scope,rbac-security-groups,revision-if-match,standard-attr-revisions,router_availability_zone,security-groups-normalized-cidr,security-groups-remote-address-group,security-groups-shared-filtering,security-group,segment,segments-peer-subnet-host-routes,service-type,sorting,standard-attr-segment,standard-attr-description,stateful-security-group,subnet-dns-publish-fixed-ip,subnet-segmentid-writable,subnet-service-types,subnet_allocation,subnetpool-prefix-ops,standard-attr-tag,standard-attr-timestamp,trunk,trunk-details set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [object-storage-feature-enabled] discoverable_apis = symlink,versioned_writes,slo,account_quotas,container_quotas,staticweb,s3api,formpost,ratelimit,tempurl,bulk_upload,bulk_delete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [volume-feature-enabled] api_extensions = os-admin-actions,os-availability-zone,backups,capabilities,cgsnapshots,consistencygroups,os-extended-services,os-extended-snapshot-attributes,os-hosts,qos-specs,os-quota-class-sets,os-quota-sets,OS-SCH-HNT,scheduler-stats,os-services,os-snapshot-actions,os-snapshot-manage,os-snapshot-unmanage,os-types-extra-specs,os-types-manage,os-used-limits,os-volume-actions,os-volume-encryption-metadata,os-vol-host-attr,os-vol-image-meta,os-volume-manage,os-vol-mig-status-attr,os-vol-tenant-attr,os-volume-transfer,os-volume-type-access,encryption,os-volume-unmanage set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m\n2026-02-27 10:06:02.370 13 INFO config_tempest.constants [-] Creating configuration file /var/lib/tempest/openshift/etc/tempest.conf\e[00m\n{0} tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops [26.573689s] ... FAILED\n\nCaptured traceback:\n~~~~~~~~~~~~~~~~~~~\n Traceback (most recent call last):\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/utils/__init__.py\", line 65, in wrapper\n return f(*func_args, **func_kwargs)\n\n File \"/usr/lib/python3.9/site-packages/tempest/scenario/test_server_basic_ops.py\", line 127, in test_server_basic_ops\n self.instance = self.create_server(\n\n \ File \"/usr/lib/python3.9/site-packages/tempest/scenario/manager.py\", line 349, in create_server\n body, _ = compute.create_test_server(\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/compute.py\", line 359, in create_test_server\n LOG.exception('Server %s failed to delete in time',\n\n File \"/usr/lib/python3.9/site-packages/oslo_utils/excutils.py\", line 227, in __exit__\n self.force_reraise()\n\n File \"/usr/lib/python3.9/site-packages/oslo_utils/excutils.py\", line 200, in force_reraise\n raise self.value\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/compute.py\", line 323, in create_test_server\n server = waiters.wait_for_server_status(\n\n \ File \"/usr/lib/python3.9/site-packages/tempest/common/waiters.py\", line 80, in wait_for_server_status\n raise exceptions.BuildErrorException(details, server_id=server_id)\n\n tempest.exceptions.BuildErrorException: Server b30c813d-5a37-43fe-b947-3b4677312897 failed to build and is in ERROR status\nDetails: Fault: {'code': 500, 'created': '2026-02-27T10:06:50Z', 'message': 'No valid host was found. There are not enough hosts available.'}. Request ID of server operation performed before checking the server status req-73e02585-d6fb-4e43-b8df-7fbb912e9fad.\n\n\nCaptured pythonlogging:\n~~~~~~~~~~~~~~~~~~~~~~~\n \ 2026-02-27 10:06:31,318 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.418s\n2026-02-27 10:06:31,318 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"keypair\": {\"name\": \"tempest-TestServerBasicOps-60721501\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:30 GMT', 'server': 'Apache', 'content-length': '395', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02a25c96-f41f-4a1a-8444-0086eac38212', 'x-compute-request-id': 'req-02a25c96-f41f-4a1a-8444-0086eac38212', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs'}\n \ Body: b'{\"keypair\": {\"name\": \"tempest-TestServerBasicOps-60721501\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==\", \"fingerprint\": \"b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\"}}'\n2026-02-27 10:06:32,324 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 1.003s\n2026-02-27 10:06:32,324 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group\": {\"name\": \"tempest-secgroup-smoke-1910478022\", \"description\": \"tempest-secgroup-smoke-1910478022 description\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:32 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '1609', 'x-openstack-request-id': 'req-5eb69fd3-077e-475b-a2ff-95739e17c1bd', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups'}\n \ Body: b'{\"security_group\": {\"id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"name\": \"tempest-secgroup-smoke-1910478022\", \"stateful\": true, \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"tempest-secgroup-smoke-1910478022 description\", \"shared\": false, \"security_group_rules\": [{\"id\": \"425d9a02-931e-4802-a215-61da7ba99a00\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 38, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}, {\"id\": \"6c797223-133f-4493-b8cc-e764ad131123\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cid\n r\": null, \"remote_group_id\": null, \"standard_attr_id\": 37, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}], \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 1, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:33,418 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 1.092s\n2026-02-27 10:06:33,418 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:33 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '565', 'x-openstack-request-id': 'req-a93c8299-bcfb-4d09-aa92-ab0375b6e562', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"55771be5-66b2-417d-a1c3-a275dc1a3dc5\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:33Z\", \"updated_at\": \"2026-02-27T10:06:33Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:34,319 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.900s\n2026-02-27 10:06:34,319 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:34 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '564', 'x-openstack-request-id': 'req-413511b8-f24e-44b2-8113-6250949a2a9c', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"2a69b865-78f6-4cb5-9392-c58f02fd4a28\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:34Z\", \"updated_at\": \"2026-02-27T10:06:34Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:35,164 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.844s\n2026-02-27 10:06:35,165 16 DEBUG [tempest.lib.common.rest_client] Request - Header\n s: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:35 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '570', 'x-openstack-request-id': 'req-d7ac7743-3668-4600-8e71-d75e94fa9784', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"75321a6b-0e2d-4710-bbe0-677c137a9be6\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:34Z\", \"updated_at\": \"2026-02-27T10:06:34Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:36,091 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.926s\n2026-02-27 10:06:36,092 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:36 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '569', 'x-openstack-request-id': 'req-188e40b8-3b8c-41ef-97f1-85ecfa4da46e', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"3763ac3a-b930-4772-803b-5ec85e8a09e3\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:35Z\", \"updated_at\": \"2026-02-27T10:06:35Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:36,475 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.382s\n2026-02-27 10:06:36,475 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"ethertype\": \"IPv6\", \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:36 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '575', 'x-openstack-request-id': 'req-e1914988-1bd8-4fc9-a517-5fef8621d9e6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/securi\n \ ty-group-rules'}\n Body: b'{\"security_group_rule\": {\"id\": \"4be2fa91-c334-45fc-86ae-7a5e03c8160d\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"ingress\", \"protocol\": \"ipv6-icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:36Z\", \"updated_at\": \"2026-02-27T10:06:36Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:37,134 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.658s\n2026-02-27 10:06:37,135 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"ethertype\": \"IPv6\", \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '574', 'x-openstack-request-id': 'req-5dae4c86-0894-4cbd-9169-9112dece477e', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"6149565f-213a-4114-8f88-0f6bbee9f546\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": \"ipv6-icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:36Z\", \"updated_at\": \"2026-02-27T10:06:36Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:37,622 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.441s\n2026-02-27 10:06:37,622 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'}\n Body: \n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-length': '4724', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd01e0ec-839b-4ca5-a619-449021e0e6d4', 'content-type': 'application/json', 'set-cookie': 'b5697f82cf3c19ece8be533395142512=22cd4304560c1ef561b47119152b55db; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens'}\n \ Body: b'{\"token\": {\"methods\": [\"password\"], \"user\": {\"domain\": {\"id\": \"default\", \"name\": \"Default\"}, \"id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"name\": \"tempest-TestServerBasicOps-1404073125-project-member\", \"password_expires_at\": null}, \"audit_ids\": [\"MPv4SFyiQjGgcUJVCZ-gZw\"], \"expires_at\": \"2026-02-27T11:06:37.000000Z\", \"issued_at\": \"2026-02-27T10:06:37.000000Z\", \"project\": {\"domain\": {\"id\": \"default\", \"name\": \"Default\"}, \"id\": \"2a822d4c0aca41959976634e55c51931\", \"name\": \"tempest-TestServerBasicOps-1404073125\"}, \"is_domain\": false, \"roles\": [{\"id\": \"8c30652b7d594ba08185d9be03965b06\", \"name\": \"member\"}, {\"id\": \"0d51bc8335fb41c2921912dff3e6a896\", \"name\": \"reader\"}], \"catalog\": [{\"endpoints\": [{\"name\": \"nova\", \"id\": \"2c7400dac72c4dd5b8bf0643b4f321cd\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://nova-internal.openstack.svc:8774/v2.1\", \"region\": \"regionO\n ne\"}, {\"name\": \"nova\", \"id\": \"de307f55a1bd4ee6a957b8d81678b29c\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://nova-public-openstack.apps-crc.testing/v2.1\", \"region\": \"regionOne\"}], \"id\": \"22bcbaa64ec244c8a8645d41cfe97a1d\", \"type\": \"compute\", \"name\": \"nova\"}, {\"endpoints\": [{\"name\": \"neutron\", \"id\": \"22da66fef0bd4b938a5a963d95415995\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://neutron-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"neutron\", \"id\": \"516c42c793834c6594c83ac7f225cf34\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://neutron-internal.openstack.svc:9696\", \"region\": \"regionOne\"}], \"id\": \"316f206b5f054e2587809cab7b01e204\", \"type\": \"network\", \"name\": \"neutron\"}, {\"endpoints\": [{\"id\": \"082c0993bc074baa87f4babd0f97c8a7\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://keystone-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"id\": \"39eb4c69af234ec491d604200460541f\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://keystone-internal.openstack.svc:5000\", \"region\": \"regionOne\"}], \"id\": \"3712ae399fd74a788e85008f2d7cbd4e\", \"type\": \"identity\", \"name\": \"keystone\"}, {\"endpoints\": [{\"name\": \"placement\", \"id\": \"0f96c2ef099d48c792c33dc104fab435\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://placement-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"placement\", \"id\": \"1a90ab5e11084ec1b129c6aecd35261c\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://placement-internal.openstack.svc:8778\", \"region\": \"regionOne\"}], \"id\": \"71beb82bfec54ab29d5dfcd81fcb3680\", \"type\": \"placement\", \"name\": \"placement\"}, {\"endpoints\": [{\"name\": \"cinderv3\", \"id\": \"bc8957a89d0242419565581d51a118d4\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://cinder-internal.openstack.svc:8776/v3\", \"region\": \"regionOne\"}, {\"name\": \"cinderv3\", \"id\": \"c16edbf8573e43a1867a1ae3675ff6d9\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://cinder-public-openstack.apps-crc.testing/v3\", \"region\": \"regionOne\"}], \"id\": \"787c98708a7c4528a344419059ff2d05\", \"type\": \"volumev3\", \"name\": \"cinderv3\"}, {\"endpoints\": [{\"name\": \"glance\", \"id\": \"2accf96d1f3c4210ae8603638d7c5941\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://glance-default-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"glance\", \"id\": \"72977d746e0543128f7d353b7bc8ea64\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://glance-default-internal.openstack.svc:9292\", \"region\": \"regionOne\"}], \"id\": \"7e20e463502642c29be0e94fb041b188\", \"type\": \"image\", \"name\": \"glance\"}, {\"endpoints\": [], \"id\": \"8c2d47f49dad454ea68f7aac0e8f445f\", \"type\": \"Ceilometer\", \"name\": \"ceilometer\"}, {\"endpoints\": [{\"name\": \"swift\", \"id\": \"af354d0948e742faa3639a3a9a1bc6b2\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://swift-public-openstack.apps-crc.testing/v1/AUTH_2a822d4c0aca41959976634e55c51931\", \"region\": \"regionOne\"}, {\"name\": \"swift\", \"id\": \"d7f2fd36f2ca4ab5ad3ae59990bd2210\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://swift-internal.openstack.svc:8080/v1/AUTH_2a822d4\n2026-02-27 10:06:37,623 16 INFO [tempest.lib.common.fixed_network] (TestServerBasicOps:test_server_basic_ops) Found network {'id': '8cc13bc4-6f9e-4cac-846d-020c9a7beb8b', 'name': 'tempest-TestServerBasicOps-2054800424-network', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'admin_state_up': True, 'mtu': 1442, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '2a822d4c0aca41959976634e55c51931', 'qos_policy_id': None, 'port_security_enabled': True, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'geneve', 'provider:physical_network': None, 'provider:segmentation_id': 31271, 'is_default': False, 'availability_zone_hints': [], 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2026-02-27T10:06:09Z', 'updated_at': '2026-02-27T10:0\n \ 6:09Z', 'revision_number': 1} available for tenant\n2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested setup of ValidationResources keypair True, floating IP True, security group True\n2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested validation resources keypair True, floating IP True, security group True\n2026-02-27 10:06:37,884 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.258s\n2026-02-27 10:06:37,884 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"keypair\": {\"name\": \"tempest-keypair-2079157794\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-length': '386', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6e6fa30-3a79-4247-8964-48009b91631c', 'x-compute-request-id': 'req-b6e6fa30-3a79-4247-8964-48009b91631c', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs'}\n \ Body: b'{\"keypair\": {\"name\": \"tempest-keypair-2079157794\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==\", \"fingerprint\": \"54:6e:d0:96:19:d8:4c:ae:c5:1f:b8:ac:47:77:60:10\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\"}}'\n2026-02-27 10:06:37,887 16 DEBUG [tempest.lib.common.validation_resources] Validation resource key tempest-keypair-2079157794 created\n2026-02-27 10:06:38,287 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 0.399s\n2026-02-27 10:06:38,288 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group\": {\"name\": \"tempest-securitygroup--421385732\", \"description\": \"tempest-description--313145705\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:38 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '1593', 'x-openstack-request-id': 'req-4313901c-8faa-4877-b497-75794b84d306', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups'}\n \ Body: b'{\"security_group\": {\"id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"name\": \"tempest-securitygroup--421385732\", \"stateful\": true, \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"tempest-description--313145705\", \"shared\": false, \"security_group_rules\": [{\"id\": \"5b2a06a5-c520-4a75-b11f-9104010eaa4b\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 47, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_nu\n mber\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}, {\"id\": \"e5c049e2-faf4-427f-9768-c5471c17c997\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 46, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}], \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 1, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:38,682 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.394s\n2026-02-27 10:06:38,683 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"protocol\": \"tcp\", \"ethertype\": \"IPv4\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:38 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '565', 'x-openstack-request-id': 'req-84ebbc00-fc38-4f86-8e42-6867681c191d', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"f5705e25-6c44-4a28-a5bb-40f716fd737e\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:39,025 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.341s\n2026-02-27 10:06:39,025 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"protocol\": \"icmp\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:39 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '570', 'x-openstack-request-id': 'req-b9e11227-d89c-4e7d-8c86-6d86afc1c7f0', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"e00f6958-e64c-4278-8844-fed96af8d3c4\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-0\n \ 2-27 10:06:39,026 16 DEBUG [tempest.lib.common.validation_resources] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--421385732 created\n2026-02-27 10:06:40,459 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips 1.428s\n2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"floatingip\": {\"floating_network_id\": \"ee418dcf-f8c2-433e-89a5-174f0da48e20\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:40 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-353deff8-98d3-4a42-b658-b435c9b00466', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips'}\n \ Body: b'{\"floatingip\": {\"id\": \"16090d1d-102a-4fbe-bde7-07ed95789524\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"floating_ip_address\": \"192.168.122.215\", \"floating_network_id\": \"ee418dcf-f8c2-433e-89a5-174f0da48e20\", \"router_id\": null, \"port_id\": null, \"fixed_ip_address\": null, \"status\": \"DOWN\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"\", \"qos_policy_id\": null, \"port_details\": null, \"dns_domain\": \"\", \"dns_name\": \"\", \"port_forwardings\": [], \"tags\": [], \"created_at\": \"2026-02-27T10:06:39Z\", \"updated_at\": \"2026-02-27T10:06:39Z\", \"revision_number\": 0}}'\n2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.validation_resources] Validation resource floating IP {'id': '16090d1d-102a-4fbe-bde7-07ed95789524', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'floating_ip_address': '192.168.122.215', 'floating_network_id': 'ee418dcf-f8c2-433e-89a5-174f0da48e20', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '2a822d4c0aca41959976634e55c51931', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2026-02-27T10:06:39Z', 'updated_at': '2026-02-27T10:06:39Z', 'revision_number': 0, 'ip': '192.168.122.215'} created\n2026-02-27 10:06:40,462 16 DEBUG [tempest.common.compute] Provisioning test server with validation resources {'keypair': {'name': 'tempest-TestServerBasicOps-60721501', 'public_key': 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==', 'fingerprint': 'b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70', 'user_id': '3e57fb072f774ce0a351fafc32a340fb', 'private_key': '-----BEGIN EC PRIVATE KEY-----\\nMIGkAgEBBDAcLFYx7ONSnZn3afsB/miKAnRQeTRccBMIgRyPIuh5fiOvsbiUw3/U\\n2uFHLRudXuqgBwYFK4EEACKhZANiAARxxR3bCZ+fdp8fu3ERv3Vti8JPOjgl1Nnn\\nIFn4VZp5vx3et19WlX6i5Y27XX4IkFgIx+Zr0hHXiGRqc72LjkyHsBegPMcfg76I\\nMikIZM+KfUGWAaNxd40aluxhPRihz44=\\n-----END EC PRIVATE KEY-----\\n'}, 'security_group': {'id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'name': 'tempest-securitygroup--421385732', 'stateful': True, 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'description': 'tempest-description--313145705', 'shared': False, 'security_group_rules': [{'id': '5b2a06a5-c520-4a75-b11f-9104010eaa4b', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'security_group_id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'ethertype': 'IPv6', 'direction': 'egress', 'protocol': None, 'port_range_min': None, 'port_range_max': None, 'remote_ip_prefix': None, 'remote_address_group_id': None, 'normalized_cidr': None, 'remote_group_id': None, 'standard_attr_id': 47, 'description': None, 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 0, 'project_id': '2a822d4c0aca41959976634e55c51931'}, {'i\n d': 'e5c049e2-faf4-427f-9768-c5471c17c997', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'security_group_id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'ethertype': 'IPv4', 'direction': 'egress', 'protocol': None, 'port_range_min': None, 'port_range_max': None, 'remote_ip_prefix': None, 'remote_address_group_id': None, 'normalized_cidr': None, 'remote_group_id': None, 'standard_attr_id': 46, 'description': None, 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 0, 'project_id': '2a822d4c0aca41959976634e55c51931'}], 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 1, 'project_id': '2a822d4c0aca41959976634e55c51931'}, 'floating_ip': {'id': '16090d1d-102a-4fbe-bde7-07ed95789524', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'floating_ip_address': '192.168.122.215', 'floating_network_id': 'ee418dcf-f8c2-433e-89a5-174f0da48e20', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '2a822d4c0aca41959976634e55c51931', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2026-02-27T10:06:39Z', 'updated_at': '2026-02-27T10:06:39Z', 'revision_number': 0, 'ip': '192.168.122.215'}}\n2026-02-27 10:06:48,732 16 INFO \ [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 202 POST https://nova-public-openstack.apps-crc.testing/v2.1/servers 8.269s\n2026-02-27 10:06:48,733 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"server\": {\"name\": \"tempest-TestServerBasicOps-server-83084592\", \"imageRef\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"flavorRef\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"security_groups\": [{\"name\": \"tempest-secgroup-smoke-1910478022\"}, {\"name\": \"tempest-securitygroup--421385732\"}], \"config_drive\": true, \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"networks\": [{\"uuid\": \"8cc13bc4-6f9e-4cac-846d-020c9a7beb8b\"}], \"user_data\": \"IyEvYmluL3NoCmVjaG8gIlByaW50aW5nIGNpcnJvcyB1c2VyIGF1dGhvcml6ZWQga2V5cyIKY2F0IH5jaXJyb3MvLnNzaC9hdXRob3JpemVkX2tleXMgfHwgdHJ1ZQo=\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:40 GMT', 'server': 'Apache', 'content-length': '492', 'location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73e02585-d6fb-4e43-b8df-7fbb912e9fad', 'x-compute-request-id': 'req-73e02585-d6fb-4e43-b8df-7fbb912e9fad', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"security_groups\": [{\"name\": \"tempest-secgroup-smoke-1910478022\"}, {\"name\": \"tempest-securitygroup--421385732\"}], \"adminPass\": \"LNtGjhXTZ4WY\"}}'\n2026-02-27 10:06:50,126 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.390s\n2026-02-27 10:06:50,126 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'\n , 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:48 GMT', 'server': 'Apache', 'content-length': '1445', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5', 'x-compute-request-id': 'req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"name\": \"tempest-TestServerBasicOps-server-83084592\", \"status\": \"BUILD\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"hostId\": \"\", \"image\": {\"id\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\"}]}, \"flavor\": {\"id\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92\"}]}, \"created\": \"2026-02-27T10:06:48Z\", \"updated\": \"2026-02-27T10:06:48Z\", \"addresses\": {}, \"accessIPv4\": \"\", \"accessIPv6\": \"\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"progress\": 0, \"OS-EXT-AZ:availability_zone\": \"\", \"config_drive\": \"True\", \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"OS-SRV-USG:launched_at\": null, \"OS-SRV-USG:terminated_at\": null, \"OS-EXT-STS:task_state\": \"scheduling\", \"OS-EXT-STS:vm_state\": \"building\", \"OS-EXT-STS:power_state\": 0, \"os-extended-volumes:volumes_attached\": []}}'\n2026-02-27 10:06:52,190 16 INFO \ [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.056s\n2026-02-27 10:06:52,190 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:51 GMT', 'server': 'Apache', 'content-length': '1555', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ac524ec-4d4c-4377-977c-2ce36fa90605', 'x-compute-request-id': 'req-6ac524ec-4d4c-4377-977c-2ce36fa90605', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"name\": \"tempest-TestServerBasicOps-server-83084592\", \"status\": \"ERROR\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"hostId\": \"\", \"image\": {\"id\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\"}]}, \"flavor\": {\"id\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-\n crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92\"}]}, \"created\": \"2026-02-27T10:06:48Z\", \"updated\": \"2026-02-27T10:06:50Z\", \"addresses\": {}, \"accessIPv4\": \"\", \"accessIPv6\": \"\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"fault\": {\"code\": 500, \"created\": \"2026-02-27T10:06:50Z\", \"message\": \"No valid host was found. There are not enough hosts available.\"}, \"OS-EXT-AZ:availability_zone\": \"\", \"config_drive\": \"True\", \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"OS-SRV-USG:launched_at\": null, \"OS-SRV-USG:terminated_at\": null, \"OS-EXT-STS:task_state\": null, \"OS-EXT-STS:vm_state\": \"error\", \"OS-EXT-STS:power_state\": 0, \"os-extended-volumes:volumes_attached\": []}}'\n2026-02-27 10:06:52,199 16 INFO \ [tempest.common.waiters] State transition \"BUILD/scheduling\" ==> \"ERROR/None\" after 2 second wait\n2026-02-27 10:06:53,985 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 204 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.786s\n2026-02-27 10:06:53,986 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:52 GMT', 'server': 'Apache', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1119f923-1f00-41b2-9b04-1e1f44c2549f', 'x-compute-request-id': 'req-1119f923-1f00-41b2-9b04-1e1f44c2549f', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b''\n2026-02-27 10:06:54,089 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 404 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 0.103s\n2026-02-27 10:06:54,090 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:53 GMT', 'server': 'Apache', 'content-length': '111', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b13b63a-a351-47ca-abc8-aac925ae6a3b', 'x-compute-request-id': 'req-3b13b63a-a351-47ca-abc8-aac925ae6a3b', 'content-type': 'application/json; charset=UTF-8', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '404', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"itemNotFound\": {\"code\": 404, \"message\": \"Instance b30c813d-5a37-43fe-b947-3b4677312897 could not be found.\"}}'\n2026-02-27 10:06:54,261 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794 0.168s\n2026-02-27 10:06:54,262 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:54 GMT', 'server': 'Apache', 'content-len\n gth': '0', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e97a40d7-e0bd-47f7-ab22-66843ac5c096', 'x-compute-request-id': 'req-e97a40d7-e0bd-47f7-ab22-66843ac5c096', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794'}\n \ Body: b''\n2026-02-27 10:06:55,442 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 1.180s\n2026-02-27 10:06:55,443 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:55 GMT', 'server': 'Apache', 'x-openstack-request-id': 'req-b10c39cf-8668-4352-b585-4aa7f87cc4eb', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8'}\n \ Body: b''\n2026-02-27 10:06:56,104 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 404 GET https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 0.660s\n2026-02-27 10:06:56,104 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:56 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-d569e154-39fe-4873-ac84-7e2b91f621f6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '404', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8'}\n \ Body: b'{\"NeutronError\": {\"type\": \"SecurityGroupNotFound\", \"message\": \"Security group 384f2878-b9a1-45d0-beeb-7aaf4782d0c8 does not exist\", \"detail\": \"\"}}'\n2026-02-27 10:06:57,000 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524 0.895s\n2026-02-27 10:06:57,001 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:56 GMT', 'server': 'Apache', 'x-openstack-request-id': 'req-66c92945-9575-4aa5-bd70-9d2f432b5fc6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524'}\n \ Body: b''\n2026-02-27 10:06:57,330 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51 0.321s\n2026-02-27 10:06:57,330 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:57 GMT', 'server': 'Apache', 'x-openstack-requ\n est-id': 'req-0530235f-29f4-4ad4-9297-a9b4213d1992', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51'}\n \ Body: b''\n2026-02-27 10:06:57,469 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501 0.138s\n2026-02-27 10:06:57,470 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:57 GMT', 'server': 'Apache', 'content-length': '0', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1', 'x-compute-request-id': 'req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501'}\n \ Body: b''\n\n\n==============================\nFailed 1 tests - output below:\n==============================\n\ntempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops[compute,id-7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba,network,smoke]\n----------------------------------------------------------------------------------------------------------------------------------------------\n\nCaptured traceback:\n~~~~~~~~~~~~~~~~~~~\n Traceback (most recent call last):\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/utils/__init__.py\", line 65, in wrapper\n return f(*func_args, **func_kwargs)\n\n File \"/usr/lib/python3.9/site-packages/tempest/scenario/test_server_basic_ops.py\", line 127, in test_server_basic_ops\n self.instance = self.create_server(\n\n \ File \"/usr/lib/python3.9/site-packages/tempest/scenario/manager.py\", line 349, in create_server\n body, _ = compute.create_test_server(\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/compute.py\", line 359, in create_test_server\n LOG.exception('Server %s failed to delete in time',\n\n File \"/usr/lib/python3.9/site-packages/oslo_utils/excutils.py\", line 227, in __exit__\n self.force_reraise()\n\n File \"/usr/lib/python3.9/site-packages/oslo_utils/excutils.py\", line 200, in force_reraise\n raise self.value\n\n File \"/usr/lib/python3.9/site-packages/tempest/common/compute.py\", line 323, in create_test_server\n server = waiters.wait_for_server_status(\n\n \ File \"/usr/lib/python3.9/site-packages/tempest/common/waiters.py\", line 80, in wait_for_server_status\n raise exceptions.BuildErrorException(details, server_id=server_id)\n\n tempest.exceptions.BuildErrorException: Server b30c813d-5a37-43fe-b947-3b4677312897 failed to build and is in ERROR status\nDetails: Fault: {'code': 500, 'created': '2026-02-27T10:06:50Z', 'message': 'No valid host was found. There are not enough hosts available.'}. Request ID of server operation performed before checking the server status req-73e02585-d6fb-4e43-b8df-7fbb912e9fad.\n\n\nCaptured pythonlogging:\n~~~~~~~~~~~~~~~~~~~~~~~\n \ 2026-02-27 10:06:31,318 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.418s\n2026-02-27 10:06:31,318 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"keypair\": {\"name\": \"tempest-TestServerBasicOps-60721501\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:30 GMT', 'server': 'Apache', 'content-length': '395', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02a25c96-f41f-4a1a-8444-0086eac38212', 'x-compute-request-id': 'req-02a25c96-f41f-4a1a-8444-0086eac38212', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs'}\n \ Body: b'{\"keypair\": {\"name\": \"tempest-TestServerBasicOps-60721501\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==\", \"fingerprint\": \"b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\"}}'\n2026-02-27 10:06:32,324 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 1.003s\n2026-02-27 10:06:32,324 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group\": {\"name\": \"tempest-secgroup-smoke-1910478022\", \"description\": \"tempest-secgroup-smoke-1910478022 description\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:32 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '1609', 'x-openstack-request-id': 'req-5eb69fd3-077e-475b-a2ff-95739e17c1bd', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups'}\n \ Body: b'{\"security_group\": {\"id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"name\": \"tempest-secgroup-smoke-1910478022\", \"stateful\": true, \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"tempest-secgroup-smoke-1910478022 description\", \"shared\": false, \"security_group_rules\": [{\"id\": \"425d9a02-931e-4802-a215-61da7ba99a00\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 38, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}, {\"id\": \"6c797223-133f-4493-b8cc-e764ad131123\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cid\n r\": null, \"remote_group_id\": null, \"standard_attr_id\": 37, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}], \"tags\": [], \"created_at\": \"2026-02-27T10:06:32Z\", \"updated_at\": \"2026-02-27T10:06:32Z\", \"revision_number\": 1, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:33,418 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 1.092s\n2026-02-27 10:06:33,418 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:33 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '565', 'x-openstack-request-id': 'req-a93c8299-bcfb-4d09-aa92-ab0375b6e562', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"55771be5-66b2-417d-a1c3-a275dc1a3dc5\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:33Z\", \"updated_at\": \"2026-02-27T10:06:33Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:34,319 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.900s\n2026-02-27 10:06:34,319 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:34 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '564', 'x-openstack-request-id': 'req-413511b8-f24e-44b2-8113-6250949a2a9c', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"2a69b865-78f6-4cb5-9392-c58f02fd4a28\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:34Z\", \"updated_at\": \"2026-02-27T10:06:34Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:35,164 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.844s\n2026-02-27 10:06:35,165 16 DEBUG [tempest.lib.common.rest_client] Request - Header\n s: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:35 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '570', 'x-openstack-request-id': 'req-d7ac7743-3668-4600-8e71-d75e94fa9784', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"75321a6b-0e2d-4710-bbe0-677c137a9be6\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:34Z\", \"updated_at\": \"2026-02-27T10:06:34Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:36,091 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.926s\n2026-02-27 10:06:36,092 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:36 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '569', 'x-openstack-request-id': 'req-188e40b8-3b8c-41ef-97f1-85ecfa4da46e', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"3763ac3a-b930-4772-803b-5ec85e8a09e3\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:35Z\", \"updated_at\": \"2026-02-27T10:06:35Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:36,475 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.382s\n2026-02-27 10:06:36,475 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"ethertype\": \"IPv6\", \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:36 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '575', 'x-openstack-request-id': 'req-e1914988-1bd8-4fc9-a517-5fef8621d9e6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/securi\n \ ty-group-rules'}\n Body: b'{\"security_group_rule\": {\"id\": \"4be2fa91-c334-45fc-86ae-7a5e03c8160d\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"ingress\", \"protocol\": \"ipv6-icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:36Z\", \"updated_at\": \"2026-02-27T10:06:36Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:37,134 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.658s\n2026-02-27 10:06:37,135 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"protocol\": \"icmp\", \"ethertype\": \"IPv6\", \"direction\": \"egress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '574', 'x-openstack-request-id': 'req-5dae4c86-0894-4cbd-9169-9112dece477e', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"6149565f-213a-4114-8f88-0f6bbee9f546\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"1ce27349-eaf2-421f-9a32-2785f562cc51\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": \"ipv6-icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:36Z\", \"updated_at\": \"2026-02-27T10:06:36Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:37,622 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.441s\n2026-02-27 10:06:37,622 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'}\n Body: \n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-length': '4724', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd01e0ec-839b-4ca5-a619-449021e0e6d4', 'content-type': 'application/json', 'set-cookie': 'b5697f82cf3c19ece8be533395142512=22cd4304560c1ef561b47119152b55db; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens'}\n \ Body: b'{\"token\": {\"methods\": [\"password\"], \"user\": {\"domain\": {\"id\": \"default\", \"name\": \"Default\"}, \"id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"name\": \"tempest-TestServerBasicOps-1404073125-project-member\", \"password_expires_at\": null}, \"audit_ids\": [\"MPv4SFyiQjGgcUJVCZ-gZw\"], \"expires_at\": \"2026-02-27T11:06:37.000000Z\", \"issued_at\": \"2026-02-27T10:06:37.000000Z\", \"project\": {\"domain\": {\"id\": \"default\", \"name\": \"Default\"}, \"id\": \"2a822d4c0aca41959976634e55c51931\", \"name\": \"tempest-TestServerBasicOps-1404073125\"}, \"is_domain\": false, \"roles\": [{\"id\": \"8c30652b7d594ba08185d9be03965b06\", \"name\": \"member\"}, {\"id\": \"0d51bc8335fb41c2921912dff3e6a896\", \"name\": \"reader\"}], \"catalog\": [{\"endpoints\": [{\"name\": \"nova\", \"id\": \"2c7400dac72c4dd5b8bf0643b4f321cd\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://nova-internal.openstack.svc:8774/v2.1\", \"region\": \"regionO\n ne\"}, {\"name\": \"nova\", \"id\": \"de307f55a1bd4ee6a957b8d81678b29c\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://nova-public-openstack.apps-crc.testing/v2.1\", \"region\": \"regionOne\"}], \"id\": \"22bcbaa64ec244c8a8645d41cfe97a1d\", \"type\": \"compute\", \"name\": \"nova\"}, {\"endpoints\": [{\"name\": \"neutron\", \"id\": \"22da66fef0bd4b938a5a963d95415995\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://neutron-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"neutron\", \"id\": \"516c42c793834c6594c83ac7f225cf34\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://neutron-internal.openstack.svc:9696\", \"region\": \"regionOne\"}], \"id\": \"316f206b5f054e2587809cab7b01e204\", \"type\": \"network\", \"name\": \"neutron\"}, {\"endpoints\": [{\"id\": \"082c0993bc074baa87f4babd0f97c8a7\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://keystone-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"id\": \"39eb4c69af234ec491d604200460541f\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://keystone-internal.openstack.svc:5000\", \"region\": \"regionOne\"}], \"id\": \"3712ae399fd74a788e85008f2d7cbd4e\", \"type\": \"identity\", \"name\": \"keystone\"}, {\"endpoints\": [{\"name\": \"placement\", \"id\": \"0f96c2ef099d48c792c33dc104fab435\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://placement-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"placement\", \"id\": \"1a90ab5e11084ec1b129c6aecd35261c\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://placement-internal.openstack.svc:8778\", \"region\": \"regionOne\"}], \"id\": \"71beb82bfec54ab29d5dfcd81fcb3680\", \"type\": \"placement\", \"name\": \"placement\"}, {\"endpoints\": [{\"name\": \"cinderv3\", \"id\": \"bc8957a89d0242419565581d51a118d4\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://cinder-internal.openstack.svc:8776/v3\", \"region\": \"regionOne\"}, {\"name\": \"cinderv3\", \"id\": \"c16edbf8573e43a1867a1ae3675ff6d9\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://cinder-public-openstack.apps-crc.testing/v3\", \"region\": \"regionOne\"}], \"id\": \"787c98708a7c4528a344419059ff2d05\", \"type\": \"volumev3\", \"name\": \"cinderv3\"}, {\"endpoints\": [{\"name\": \"glance\", \"id\": \"2accf96d1f3c4210ae8603638d7c5941\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://glance-default-public-openstack.apps-crc.testing\", \"region\": \"regionOne\"}, {\"name\": \"glance\", \"id\": \"72977d746e0543128f7d353b7bc8ea64\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://glance-default-internal.openstack.svc:9292\", \"region\": \"regionOne\"}], \"id\": \"7e20e463502642c29be0e94fb041b188\", \"type\": \"image\", \"name\": \"glance\"}, {\"endpoints\": [], \"id\": \"8c2d47f49dad454ea68f7aac0e8f445f\", \"type\": \"Ceilometer\", \"name\": \"ceilometer\"}, {\"endpoints\": [{\"name\": \"swift\", \"id\": \"af354d0948e742faa3639a3a9a1bc6b2\", \"interface\": \"public\", \"region_id\": \"regionOne\", \"url\": \"https://swift-public-openstack.apps-crc.testing/v1/AUTH_2a822d4c0aca41959976634e55c51931\", \"region\": \"regionOne\"}, {\"name\": \"swift\", \"id\": \"d7f2fd36f2ca4ab5ad3ae59990bd2210\", \"interface\": \"internal\", \"region_id\": \"regionOne\", \"url\": \"https://swift-internal.openstack.svc:8080/v1/AUTH_2a822d4\n2026-02-27 10:06:37,623 16 INFO [tempest.lib.common.fixed_network] (TestServerBasicOps:test_server_basic_ops) Found network {'id': '8cc13bc4-6f9e-4cac-846d-020c9a7beb8b', 'name': 'tempest-TestServerBasicOps-2054800424-network', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'admin_state_up': True, 'mtu': 1442, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '2a822d4c0aca41959976634e55c51931', 'qos_policy_id': None, 'port_security_enabled': True, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'geneve', 'provider:physical_network': None, 'provider:segmentation_id': 31271, 'is_default': False, 'availability_zone_hints': [], 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2026-02-27T10:06:09Z', 'updated_at': '2026-02-27T10:0\n \ 6:09Z', 'revision_number': 1} available for tenant\n2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested setup of ValidationResources keypair True, floating IP True, security group True\n2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested validation resources keypair True, floating IP True, security group True\n2026-02-27 10:06:37,884 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.258s\n2026-02-27 10:06:37,884 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"keypair\": {\"name\": \"tempest-keypair-2079157794\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:37 GMT', 'server': 'Apache', 'content-length': '386', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6e6fa30-3a79-4247-8964-48009b91631c', 'x-compute-request-id': 'req-b6e6fa30-3a79-4247-8964-48009b91631c', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs'}\n \ Body: b'{\"keypair\": {\"name\": \"tempest-keypair-2079157794\", \"public_key\": \"ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==\", \"fingerprint\": \"54:6e:d0:96:19:d8:4c:ae:c5:1f:b8:ac:47:77:60:10\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\"}}'\n2026-02-27 10:06:37,887 16 DEBUG [tempest.lib.common.validation_resources] Validation resource key tempest-keypair-2079157794 created\n2026-02-27 10:06:38,287 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 0.399s\n2026-02-27 10:06:38,288 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group\": {\"name\": \"tempest-securitygroup--421385732\", \"description\": \"tempest-description--313145705\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:38 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '1593', 'x-openstack-request-id': 'req-4313901c-8faa-4877-b497-75794b84d306', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups'}\n \ Body: b'{\"security_group\": {\"id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"name\": \"tempest-securitygroup--421385732\", \"stateful\": true, \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"tempest-description--313145705\", \"shared\": false, \"security_group_rules\": [{\"id\": \"5b2a06a5-c520-4a75-b11f-9104010eaa4b\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv6\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 47, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_nu\n mber\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}, {\"id\": \"e5c049e2-faf4-427f-9768-c5471c17c997\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"egress\", \"protocol\": null, \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"standard_attr_id\": 46, \"description\": null, \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}], \"tags\": [], \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 1, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:38,682 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.394s\n2026-02-27 10:06:38,683 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"protocol\": \"tcp\", \"ethertype\": \"IPv4\", \"port_range_min\": 22, \"port_range_max\": 22, \"direction\": \"ingress\"}}\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:38 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '565', 'x-openstack-request-id': 'req-84ebbc00-fc38-4f86-8e42-6867681c191d', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"f5705e25-6c44-4a28-a5bb-40f716fd737e\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"tcp\", \"port_range_min\": 22, \"port_range_max\": 22, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-02-27 10:06:39,025 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.341s\n2026-02-27 10:06:39,025 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"security_group_rule\": {\"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"protocol\": \"icmp\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:39 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '570', 'x-openstack-request-id': 'req-b9e11227-d89c-4e7d-8c86-6d86afc1c7f0', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules'}\n \ Body: b'{\"security_group_rule\": {\"id\": \"e00f6958-e64c-4278-8844-fed96af8d3c4\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"security_group_id\": \"384f2878-b9a1-45d0-beeb-7aaf4782d0c8\", \"ethertype\": \"IPv4\", \"direction\": \"ingress\", \"protocol\": \"icmp\", \"port_range_min\": null, \"port_range_max\": null, \"remote_ip_prefix\": null, \"remote_address_group_id\": null, \"normalized_cidr\": null, \"remote_group_id\": null, \"description\": \"\", \"created_at\": \"2026-02-27T10:06:38Z\", \"updated_at\": \"2026-02-27T10:06:38Z\", \"revision_number\": 0, \"project_id\": \"2a822d4c0aca41959976634e55c51931\"}}'\n2026-0\n \ 2-27 10:06:39,026 16 DEBUG [tempest.lib.common.validation_resources] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--421385732 created\n2026-02-27 10:06:40,459 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips 1.428s\n2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: {\"floatingip\": {\"floating_network_id\": \"ee418dcf-f8c2-433e-89a5-174f0da48e20\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:40 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-353deff8-98d3-4a42-b658-b435c9b00466', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '201', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips'}\n \ Body: b'{\"floatingip\": {\"id\": \"16090d1d-102a-4fbe-bde7-07ed95789524\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"floating_ip_address\": \"192.168.122.215\", \"floating_network_id\": \"ee418dcf-f8c2-433e-89a5-174f0da48e20\", \"router_id\": null, \"port_id\": null, \"fixed_ip_address\": null, \"status\": \"DOWN\", \"project_id\": \"2a822d4c0aca41959976634e55c51931\", \"description\": \"\", \"qos_policy_id\": null, \"port_details\": null, \"dns_domain\": \"\", \"dns_name\": \"\", \"port_forwardings\": [], \"tags\": [], \"created_at\": \"2026-02-27T10:06:39Z\", \"updated_at\": \"2026-02-27T10:06:39Z\", \"revision_number\": 0}}'\n2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.validation_resources] Validation resource floating IP {'id': '16090d1d-102a-4fbe-bde7-07ed95789524', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'floating_ip_address': '192.168.122.215', 'floating_network_id': 'ee418dcf-f8c2-433e-89a5-174f0da48e20', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '2a822d4c0aca41959976634e55c51931', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2026-02-27T10:06:39Z', 'updated_at': '2026-02-27T10:06:39Z', 'revision_number': 0, 'ip': '192.168.122.215'} created\n2026-02-27 10:06:40,462 16 DEBUG [tempest.common.compute] Provisioning test server with validation resources {'keypair': {'name': 'tempest-TestServerBasicOps-60721501', 'public_key': 'ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==', 'fingerprint': 'b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70', 'user_id': '3e57fb072f774ce0a351fafc32a340fb', 'private_key': '-----BEGIN EC PRIVATE KEY-----\\nMIGkAgEBBDAcLFYx7ONSnZn3afsB/miKAnRQeTRccBMIgRyPIuh5fiOvsbiUw3/U\\n2uFHLRudXuqgBwYFK4EEACKhZANiAARxxR3bCZ+fdp8fu3ERv3Vti8JPOjgl1Nnn\\nIFn4VZp5vx3et19WlX6i5Y27XX4IkFgIx+Zr0hHXiGRqc72LjkyHsBegPMcfg76I\\nMikIZM+KfUGWAaNxd40aluxhPRihz44=\\n-----END EC PRIVATE KEY-----\\n'}, 'security_group': {'id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'name': 'tempest-securitygroup--421385732', 'stateful': True, 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'description': 'tempest-description--313145705', 'shared': False, 'security_group_rules': [{'id': '5b2a06a5-c520-4a75-b11f-9104010eaa4b', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'security_group_id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'ethertype': 'IPv6', 'direction': 'egress', 'protocol': None, 'port_range_min': None, 'port_range_max': None, 'remote_ip_prefix': None, 'remote_address_group_id': None, 'normalized_cidr': None, 'remote_group_id': None, 'standard_attr_id': 47, 'description': None, 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 0, 'project_id': '2a822d4c0aca41959976634e55c51931'}, {'i\n d': 'e5c049e2-faf4-427f-9768-c5471c17c997', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'security_group_id': '384f2878-b9a1-45d0-beeb-7aaf4782d0c8', 'ethertype': 'IPv4', 'direction': 'egress', 'protocol': None, 'port_range_min': None, 'port_range_max': None, 'remote_ip_prefix': None, 'remote_address_group_id': None, 'normalized_cidr': None, 'remote_group_id': None, 'standard_attr_id': 46, 'description': None, 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 0, 'project_id': '2a822d4c0aca41959976634e55c51931'}], 'tags': [], 'created_at': '2026-02-27T10:06:38Z', 'updated_at': '2026-02-27T10:06:38Z', 'revision_number': 1, 'project_id': '2a822d4c0aca41959976634e55c51931'}, 'floating_ip': {'id': '16090d1d-102a-4fbe-bde7-07ed95789524', 'tenant_id': '2a822d4c0aca41959976634e55c51931', 'floating_ip_address': '192.168.122.215', 'floating_network_id': 'ee418dcf-f8c2-433e-89a5-174f0da48e20', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '2a822d4c0aca41959976634e55c51931', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2026-02-27T10:06:39Z', 'updated_at': '2026-02-27T10:06:39Z', 'revision_number': 0, 'ip': '192.168.122.215'}}\n2026-02-27 10:06:48,732 16 INFO \ [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 202 POST https://nova-public-openstack.apps-crc.testing/v2.1/servers 8.269s\n2026-02-27 10:06:48,733 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: {\"server\": {\"name\": \"tempest-TestServerBasicOps-server-83084592\", \"imageRef\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"flavorRef\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"security_groups\": [{\"name\": \"tempest-secgroup-smoke-1910478022\"}, {\"name\": \"tempest-securitygroup--421385732\"}], \"config_drive\": true, \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"networks\": [{\"uuid\": \"8cc13bc4-6f9e-4cac-846d-020c9a7beb8b\"}], \"user_data\": \"IyEvYmluL3NoCmVjaG8gIlByaW50aW5nIGNpcnJvcyB1c2VyIGF1dGhvcml6ZWQga2V5cyIKY2F0IH5jaXJyb3MvLnNzaC9hdXRob3JpemVkX2tleXMgfHwgdHJ1ZQo=\"}}\n \ Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:40 GMT', 'server': 'Apache', 'content-length': '492', 'location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73e02585-d6fb-4e43-b8df-7fbb912e9fad', 'x-compute-request-id': 'req-73e02585-d6fb-4e43-b8df-7fbb912e9fad', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"security_groups\": [{\"name\": \"tempest-secgroup-smoke-1910478022\"}, {\"name\": \"tempest-securitygroup--421385732\"}], \"adminPass\": \"LNtGjhXTZ4WY\"}}'\n2026-02-27 10:06:50,126 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.390s\n2026-02-27 10:06:50,126 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'\n , 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:48 GMT', 'server': 'Apache', 'content-length': '1445', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5', 'x-compute-request-id': 'req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"name\": \"tempest-TestServerBasicOps-server-83084592\", \"status\": \"BUILD\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"hostId\": \"\", \"image\": {\"id\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\"}]}, \"flavor\": {\"id\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92\"}]}, \"created\": \"2026-02-27T10:06:48Z\", \"updated\": \"2026-02-27T10:06:48Z\", \"addresses\": {}, \"accessIPv4\": \"\", \"accessIPv6\": \"\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"progress\": 0, \"OS-EXT-AZ:availability_zone\": \"\", \"config_drive\": \"True\", \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"OS-SRV-USG:launched_at\": null, \"OS-SRV-USG:terminated_at\": null, \"OS-EXT-STS:task_state\": \"scheduling\", \"OS-EXT-STS:vm_state\": \"building\", \"OS-EXT-STS:power_state\": 0, \"os-extended-volumes:volumes_attached\": []}}'\n2026-02-27 10:06:52,190 16 INFO \ [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.056s\n2026-02-27 10:06:52,190 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:51 GMT', 'server': 'Apache', 'content-length': '1555', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ac524ec-4d4c-4377-977c-2ce36fa90605', 'x-compute-request-id': 'req-6ac524ec-4d4c-4377-977c-2ce36fa90605', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '200', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"server\": {\"id\": \"b30c813d-5a37-43fe-b947-3b4677312897\", \"name\": \"tempest-TestServerBasicOps-server-83084592\", \"status\": \"ERROR\", \"tenant_id\": \"2a822d4c0aca41959976634e55c51931\", \"user_id\": \"3e57fb072f774ce0a351fafc32a340fb\", \"metadata\": {\"meta1\": \"data1\", \"meta2\": \"data2\", \"metaN\": \"dataN\"}, \"hostId\": \"\", \"image\": {\"id\": \"4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2\"}]}, \"flavor\": {\"id\": \"3070fbcb-76a6-487a-9634-3b061cf48b92\", \"links\": [{\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-\n crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92\"}]}, \"created\": \"2026-02-27T10:06:48Z\", \"updated\": \"2026-02-27T10:06:50Z\", \"addresses\": {}, \"accessIPv4\": \"\", \"accessIPv6\": \"\", \"links\": [{\"rel\": \"self\", \"href\": \"https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}, {\"rel\": \"bookmark\", \"href\": \"https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897\"}], \"OS-DCF:diskConfig\": \"MANUAL\", \"fault\": {\"code\": 500, \"created\": \"2026-02-27T10:06:50Z\", \"message\": \"No valid host was found. There are not enough hosts available.\"}, \"OS-EXT-AZ:availability_zone\": \"\", \"config_drive\": \"True\", \"key_name\": \"tempest-TestServerBasicOps-60721501\", \"OS-SRV-USG:launched_at\": null, \"OS-SRV-USG:terminated_at\": null, \"OS-EXT-STS:task_state\": null, \"OS-EXT-STS:vm_state\": \"error\", \"OS-EXT-STS:power_state\": 0, \"os-extended-volumes:volumes_attached\": []}}'\n2026-02-27 10:06:52,199 16 INFO \ [tempest.common.waiters] State transition \"BUILD/scheduling\" ==> \"ERROR/None\" after 2 second wait\n2026-02-27 10:06:53,985 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 204 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.786s\n2026-02-27 10:06:53,986 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:52 GMT', 'server': 'Apache', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1119f923-1f00-41b2-9b04-1e1f44c2549f', 'x-compute-request-id': 'req-1119f923-1f00-41b2-9b04-1e1f44c2549f', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b''\n2026-02-27 10:06:54,089 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 404 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 0.103s\n2026-02-27 10:06:54,090 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:53 GMT', 'server': 'Apache', 'content-length': '111', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b13b63a-a351-47ca-abc8-aac925ae6a3b', 'x-compute-request-id': 'req-3b13b63a-a351-47ca-abc8-aac925ae6a3b', 'content-type': 'application/json; charset=UTF-8', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '404', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'}\n \ Body: b'{\"itemNotFound\": {\"code\": 404, \"message\": \"Instance b30c813d-5a37-43fe-b947-3b4677312897 could not be found.\"}}'\n2026-02-27 10:06:54,261 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794 0.168s\n2026-02-27 10:06:54,262 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:54 GMT', 'server': 'Apache', 'content-len\n gth': '0', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e97a40d7-e0bd-47f7-ab22-66843ac5c096', 'x-compute-request-id': 'req-e97a40d7-e0bd-47f7-ab22-66843ac5c096', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794'}\n \ Body: b''\n2026-02-27 10:06:55,442 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 1.180s\n2026-02-27 10:06:55,443 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:55 GMT', 'server': 'Apache', 'x-openstack-request-id': 'req-b10c39cf-8668-4352-b585-4aa7f87cc4eb', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8'}\n \ Body: b''\n2026-02-27 10:06:56,104 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 404 GET https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 0.660s\n2026-02-27 10:06:56,104 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:56 GMT', 'server': 'Apache', 'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-d569e154-39fe-4873-ac84-7e2b91f621f6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '404', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8'}\n \ Body: b'{\"NeutronError\": {\"type\": \"SecurityGroupNotFound\", \"message\": \"Security group 384f2878-b9a1-45d0-beeb-7aaf4782d0c8 does not exist\", \"detail\": \"\"}}'\n2026-02-27 10:06:57,000 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524 0.895s\n2026-02-27 10:06:57,001 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:56 GMT', 'server': 'Apache', 'x-openstack-request-id': 'req-66c92945-9575-4aa5-bd70-9d2f432b5fc6', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524'}\n \ Body: b''\n2026-02-27 10:06:57,330 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51 0.321s\n2026-02-27 10:06:57,330 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:57 GMT', 'server': 'Apache', 'x-openstack-requ\n est-id': 'req-0530235f-29f4-4ad4-9297-a9b4213d1992', 'set-cookie': '38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '204', 'content-location': 'https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51'}\n \ Body: b''\n2026-02-27 10:06:57,469 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501 0.138s\n2026-02-27 10:06:57,470 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.1', 'X-Auth-Token': ''}\n Body: None\n Response - Headers: {'date': 'Fri, 27 Feb 2026 10:06:57 GMT', 'server': 'Apache', 'content-length': '0', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1', 'x-compute-request-id': 'req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1', 'content-type': 'application/json', 'set-cookie': '0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None', 'connection': 'close', 'status': '202', 'content-location': 'https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501'}\n \ Body: b''\n\n\n\n======\nTotals\n======\nRan: 1 tests in 26.5737 sec.\n - Passed: 0\n - Skipped: 0\n - Expected Fail: 0\n - Unexpected Success: 0\n - Failed: 1\nSum of execute time for each test: 26.5737 sec.\n\n==============\nWorker Balance\n==============\n - Worker 0 (1 tests) => 0:00:26.573689\n~ /\n/\nExcluded tests\nIncluded tests\n~/openshift /\nGenerate file containing failing tests\nGenerate subunit, then xml and html results\ntempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops[compute,id-7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba,network,smoke]\n/\n" stdout_lines: - python3-tempest-41.0.0-0.20250124132801.a25e0df.el9.noarch - python3-tempestconf-3.5.3-0.20260212202715.8e33668.el9.noarch - openstack-tempest-41.0.0-0.20250124132801.a25e0df.el9.noarch - ~ / - "2026-02-27 10:05:46.690 9 INFO tempest [-] Using tempest config file /etc/tempest/tempest.conf\e[00m" - ~/openshift ~ / - "2026-02-27 10:05:47.278 13 INFO tempest [-] Using tempest config file /var/lib/tempest/openshift/etc/tempest.conf\e[00m" - "2026-02-27 10:05:47.298 13 DEBUG config_tempest.constants [-] Setting basic default values load_basic_defaults /usr/lib/python3.9/site-packages/config_tempest/main.py:80\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] debug = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] use_stderr = false set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [DEFAULT] log_file = tempest.log set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] username = demo_tempestconf set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] password = secrete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] project_name = demo set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_username = alt_demo_tempestconf set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_password = secrete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [identity] alt_project_name = alt_demo set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] tempest_roles = member set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_username = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_name = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.299 13 DEBUG config_tempest.constants [-] Setting [auth] admin_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [object-storage] reseller_admin_role = ResellerAdmin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [oslo-concurrency] lock_path = /tmp set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] preserve_ports = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [network-feature-enabled] ipv6_subnet_attributes = true set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [scenario] dhcp_client = dhcpcd set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [image] image_path = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_username = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_name = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_password = 12345678 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.300 13 DEBUG config_tempest.constants [-] Setting [auth] admin_user_domain_name = Default set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] uri = https://keystone-public-openstack.apps-crc.testing set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] region = regionOne set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] dhcp_domain = set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] v3_endpoint_type = public set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [volume] catalog_type = volumev3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.301 13 DEBUG config_tempest.constants [-] Setting [identity] uri_v3 = https://keystone-public-openstack.apps-crc.testing set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.339 13 DEBUG config_tempest.constants [-] Setting [identity] disable_ssl_certificate_validation = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.340 13 DEBUG config_tempest.constants [-] Setting [identity] uri_v3 = https://keystone-public-openstack.apps-crc.testing/v3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.763 13 INFO tempest.lib.common.rest_client [req-467962fc-d8d5-43e2-b67b-bc57c6a89446 req-467962fc-d8d5-43e2-b67b-bc57c6a89446 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.423s\e[00m" - "2026-02-27 10:05:47.855 13 INFO tempest.lib.common.rest_client [req-242f46b2-ecb4-4722-84b4-88f78ab98b4b req-242f46b2-ecb4-4722-84b4-88f78ab98b4b ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.091s\e[00m" - "2026-02-27 10:05:47.855 13 DEBUG config_tempest.constants [-] Setting [auth] admin_project_id = 2cea3ad047234d1aa6686e8d6e78bc8f set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:47.856 13 INFO config_tempest.constants [-] Creating user 'demo_tempestconf' with project 'demo' and password 'secrete'\e[00m" - "2026-02-27 10:05:48.702 13 INFO tempest.lib.common.rest_client [req-0ee4a782-80c1-450d-bd4f-08c4ee9f0269 req-0ee4a782-80c1-450d-bd4f-08c4ee9f0269 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/projects 0.844s\e[00m" - "2026-02-27 10:05:48.856 13 INFO tempest.lib.common.rest_client [req-b6f5fba0-a513-4802-b3ce-2701a9880d39 req-b6f5fba0-a513-4802-b3ce-2701a9880d39 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.153s\e[00m" - "2026-02-27 10:05:49.512 13 INFO tempest.lib.common.rest_client [req-0156e999-4275-4709-86ff-7703aeedac79 req-0156e999-4275-4709-86ff-7703aeedac79 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/users 0.655s\e[00m" - "2026-02-27 10:05:49.512 13 INFO config_tempest.constants [-] Creating user 'alt_demo_tempestconf' with project 'alt_demo' and password 'secrete'\e[00m" - "2026-02-27 10:05:49.672 13 INFO tempest.lib.common.rest_client [req-36564652-e215-453a-b935-339432439cda req-36564652-e215-453a-b935-339432439cda ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/projects 0.159s\e[00m" - "2026-02-27 10:05:49.785 13 INFO tempest.lib.common.rest_client [req-482040fb-ca34-41d1-ab70-45c5ee594b3f req-482040fb-ca34-41d1-ab70-45c5ee594b3f ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.112s\e[00m" - "2026-02-27 10:05:50.313 13 INFO tempest.lib.common.rest_client [req-e68fa105-cca1-4c1e-b88a-6aa09dc7d976 req-e68fa105-cca1-4c1e-b88a-6aa09dc7d976 ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/users 0.527s\e[00m" - "2026-02-27 10:05:50.410 13 INFO tempest.lib.common.rest_client [req-8f87952b-df10-434e-ba7f-2a9dd1bc5e93 req-8f87952b-df10-434e-ba7f-2a9dd1bc5e93 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/projects 0.097s\e[00m" - "2026-02-27 10:05:50.498 13 INFO tempest.lib.common.rest_client [req-eecfb7d1-4e78-4540-98a7-aa56166e4c4f req-eecfb7d1-4e78-4540-98a7-aa56166e4c4f ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/users 0.087s\e[00m" - "2026-02-27 10:05:50.581 13 INFO tempest.lib.common.rest_client [req-a609805d-4ae2-4a15-afb6-2d4f3a72e5ac req-a609805d-4ae2-4a15-afb6-2d4f3a72e5ac ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/roles 0.083s\e[00m" - "2026-02-27 10:05:50.666 13 INFO tempest.lib.common.rest_client [req-1881354e-43ac-43f5-8ca4-15ced670c3b9 req-1881354e-43ac-43f5-8ca4-15ced670c3b9 ] Request (main): 204 PUT https://keystone-public-openstack.apps-crc.testing/v3/projects/a6aeab59106149ae9483915683320e2c/users/6f45f8c2cdbb40fa9184357666661d9f/roles/afba8a77e60e4ccb9fa5365b8cc8278b 0.084s\e[00m" - "2026-02-27 10:05:50.667 13 DEBUG config_tempest.constants [-] User 'admin' was given the 'admin' role in project 'demo' give_role_to_user /usr/lib/python3.9/site-packages/config_tempest/users.py:106\e[00m" - "2026-02-27 10:05:50.766 13 INFO tempest.lib.common.rest_client [req-3ff2915c-2f34-4cc9-bc7d-98ec7f331355 req-3ff2915c-2f34-4cc9-bc7d-98ec7f331355 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/services 0.098s\e[00m" - "2026-02-27 10:05:51.343 13 DEBUG config_tempest.constants [-] Setting [service_available] aodh = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.344 13 DEBUG config_tempest.constants [-] Setting [service_available] ironic = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.344 13 DEBUG config_tempest.constants [-] Setting [service_available] ceilometer = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.381 13 DEBUG config_tempest.constants [-] Setting [compute-feature-enabled] console_output = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.811 13 INFO tempest.lib.common.rest_client [req-5d4ca1ea-c04b-4222-a0e4-b4933f60fd7e req-5d4ca1ea-c04b-4222-a0e4-b4933f60fd7e ] Request (main): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/os-hosts 0.429s\e[00m" - "2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] min_compute_nodes = 1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] min_microversion = 2.1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [compute] max_microversion = 2.95 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [service_available] nova = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.812 13 DEBUG config_tempest.constants [-] Setting [service_available] sahara = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] trove = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] designate = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.813 13 DEBUG config_tempest.constants [-] Setting [service_available] panko = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:51.865 13 DEBUG config_tempest.constants [-] Setting [identity] auth_version = v3 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.611 13 INFO tempest.lib.common.rest_client [req-8b423317-db14-4ec3-a216-ed17a02a52f3 req-8b423317-db14-4ec3-a216-ed17a02a52f3 ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/info/stores 0.718s\e[00m" - "2026-02-27 10:05:52.612 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] import_image = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.612 13 DEBUG config_tempest.constants [-] Setting [validation] image_ssh_user = cirros set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.881 13 INFO tempest.lib.common.rest_client [req-efb594e8-28a7-43fb-8668-5af956e47eef req-efb594e8-28a7-43fb-8668-5af956e47eef ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.269s\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [image] http_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [image] http_qcow2_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] glance = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] barbican = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] zaqar = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:52.882 13 DEBUG config_tempest.constants [-] Setting [service_available] gnocchi = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.171 13 DEBUG config_tempest.constants [-] Setting [service_available] neutron = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.462 13 INFO tempest.lib.common.rest_client [tx0481acb743d14ddbb3ee8-0069a16c81 tx0481acb743d14ddbb3ee8-0069a16c81 ] Request (main): 200 GET https://swift-public-openstack.apps-crc.testing/healthcheck 0.044s\e[00m" - "2026-02-27 10:05:53.540 13 INFO tempest.lib.common.rest_client [req-c6547752-30e7-4bc3-8ee8-fad995fe4ca8 req-c6547752-30e7-4bc3-8ee8-fad995fe4ca8 ] Request (main): 200 GET https://keystone-public-openstack.apps-crc.testing/v3/roles 0.077s\e[00m" - "2026-02-27 10:05:53.541 13 INFO config_tempest.constants [-] Creating ResellerAdmin role\e[00m" - "2026-02-27 10:05:53.645 13 INFO tempest.lib.common.rest_client [req-ddd5130b-dbb2-402f-a4cf-a63cd5fe416e req-ddd5130b-dbb2-402f-a4cf-a63cd5fe416e ] Request (main): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/roles 0.104s\e[00m" - "2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [object-storage] operator_role = admin set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [service_available] swift = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.646 13 DEBUG config_tempest.constants [-] Setting [service_available] octavia = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.647 13 DEBUG config_tempest.constants [-] Setting [service_available] heat = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.696 13 DEBUG config_tempest.constants [-] Setting [placement] min_microversion = 1.0 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [placement] max_microversion = 1.39 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] placement = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] manila = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] manila = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:53.697 13 DEBUG config_tempest.constants [-] Setting [service_available] ceilometer = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.002 13 DEBUG config_tempest.constants [-] Setting [volume] min_microversion = 3.0 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.003 13 DEBUG config_tempest.constants [-] Setting [volume] max_microversion = 3.70 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] cinder = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] watcher = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] mistral = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.269 13 DEBUG config_tempest.constants [-] Setting [service_available] mistral = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.497 13 INFO tempest.lib.common.rest_client [req-715b073e-6928-47e7-9976-df2b811f2e98 req-715b073e-6928-47e7-9976-df2b811f2e98 ] Request (main): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.227s\e[00m" - "2026-02-27 10:05:54.499 13 DEBUG config_tempest.constants [-] Setting [volume] volume_size = 1 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.499 13 INFO config_tempest.constants [-] Creating flavor 'm1.nano'\e[00m" - "2026-02-27 10:05:54.649 13 INFO tempest.lib.common.rest_client [req-1b438b36-1f8c-432a-9ad0-912f8ccfe6ac req-1b438b36-1f8c-432a-9ad0-912f8ccfe6ac ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.150s\e[00m" - "2026-02-27 10:05:54.948 13 INFO tempest.lib.common.rest_client [req-9dc5a1c2-a7e4-4477-9048-85d2a590632c req-9dc5a1c2-a7e4-4477-9048-85d2a590632c ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92/os-extra_specs 0.296s\e[00m" - "2026-02-27 10:05:54.949 13 DEBUG config_tempest.constants [-] Setting [compute] flavor_ref = 3070fbcb-76a6-487a-9634-3b061cf48b92 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:54.949 13 INFO config_tempest.constants [-] Creating flavor 'm1.micro'\e[00m" - "2026-02-27 10:05:55.061 13 INFO tempest.lib.common.rest_client [req-fe752339-bacb-482b-9104-ee30dc9a90ce req-fe752339-bacb-482b-9104-ee30dc9a90ce ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors 0.111s\e[00m" - "2026-02-27 10:05:55.192 13 INFO tempest.lib.common.rest_client [req-5586f9db-508f-4c71-b1e5-751afddf54be req-5586f9db-508f-4c71-b1e5-751afddf54be ] Request (main): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/flavors/bb1069ce-7573-4853-9a84-0f1fcc548f47/os-extra_specs 0.130s\e[00m" - "2026-02-27 10:05:55.193 13 DEBUG config_tempest.constants [-] Setting [compute] flavor_ref_alt = bb1069ce-7573-4853-9a84-0f1fcc548f47 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:05:55.889 13 INFO tempest.lib.common.rest_client [req-c7fd0321-57e6-44d2-a888-8e35ddddc37d req-c7fd0321-57e6-44d2-a888-8e35ddddc37d ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.695s\e[00m" - "2026-02-27 10:05:55.890 13 INFO config_tempest.constants [-] Creating image 'cirros-0.6.2-x86_64-disk.img'\e[00m" - "2026-02-27 10:05:55.890 13 INFO config_tempest.constants [-] Downloading 'https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img' and saving as '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m" - "2026-02-27 10:05:56.450 13 INFO config_tempest.constants [-] Uploading image 'cirros-0.6.2-x86_64-disk.img' from '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m" - "2026-02-27 10:05:57.072 13 INFO tempest.lib.common.rest_client [req-366e10a1-fe33-4617-aa63-0edb6cc32558 req-366e10a1-fe33-4617-aa63-0edb6cc32558 ] Request (main): 201 POST https://glance-default-public-openstack.apps-crc.testing/v2/images 0.621s\e[00m" - "2026-02-27 10:05:59.029 13 INFO tempest.lib.common.rest_client [req-bf1ce264-9c22-4ef2-ae16-280a5c0f238a req-bf1ce264-9c22-4ef2-ae16-280a5c0f238a ] Request (main): 204 PUT https://glance-default-public-openstack.apps-crc.testing/v2/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2/file 1.956s\e[00m" - "2026-02-27 10:05:59.172 13 INFO tempest.lib.common.rest_client [req-737a8e8c-110b-47af-9037-dc28d21d9cd7 req-737a8e8c-110b-47af-9037-dc28d21d9cd7 ] Request (main): 200 GET https://glance-default-public-openstack.apps-crc.testing/v2/images 0.142s\e[00m" - "2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Creating image 'cirros-0.6.2-x86_64-disk.img_alt'\e[00m" - "2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Image 'https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img' already fetched to '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'.\e[00m" - "2026-02-27 10:05:59.173 13 INFO config_tempest.constants [-] Uploading image 'cirros-0.6.2-x86_64-disk.img_alt' from '/var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img'\e[00m" - "2026-02-27 10:05:59.968 13 INFO tempest.lib.common.rest_client [req-e93fd113-7b1b-4caf-9af3-ff63cce6ea50 req-e93fd113-7b1b-4caf-9af3-ff63cce6ea50 ] Request (main): 201 POST https://glance-default-public-openstack.apps-crc.testing/v2/images 0.794s\e[00m" - "2026-02-27 10:06:01.394 13 INFO tempest.lib.common.rest_client [req-f4830961-0b5e-4dbd-9ee9-c7701c2166bd req-f4830961-0b5e-4dbd-9ee9-c7701c2166bd ] Request (main): 204 PUT https://glance-default-public-openstack.apps-crc.testing/v2/images/0e01d936-f925-4d59-a3f8-91acd33dbd69/file 1.425s\e[00m" - "2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [scenario] img_file = /var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [compute] image_ref = 4d0f893f-8072-4a84-9d4b-3757c7f1f1c2 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:01.395 13 DEBUG config_tempest.constants [-] Setting [compute] image_ref_alt = 0e01d936-f925-4d59-a3f8-91acd33dbd69 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:01.395 13 INFO config_tempest.constants [-] Setting up network\e[00m" - "2026-02-27 10:06:01.395 13 INFO config_tempest.constants [-] No network supplied, trying auto discover for an external network while prioritizing the one called public, if not found, the network discovered last will be used.\e[00m" - "2026-02-27 10:06:02.138 13 INFO tempest.lib.common.rest_client [req-a0ed029f-bf58-4edd-b510-c528ff842bc4 req-a0ed029f-bf58-4edd-b510-c528ff842bc4 ] Request (main): 200 GET https://neutron-public-openstack.apps-crc.testing/v2.0/networks 0.742s\e[00m" - "2026-02-27 10:06:02.139 13 INFO config_tempest.constants [-] Setting ee418dcf-f8c2-433e-89a5-174f0da48e20 as the public network for tempest\e[00m" - "2026-02-27 10:06:02.139 13 DEBUG config_tempest.constants [-] Setting [network] public_network_id = ee418dcf-f8c2-433e-89a5-174f0da48e20 set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.140 13 DEBUG config_tempest.constants [-] Setting [network] floating_network_name = public set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.311 13 INFO tempest.lib.common.rest_client [req-8aa57119-4d17-4f5d-8696-b93e9caa3f71 req-8aa57119-4d17-4f5d-8696-b93e9caa3f71 ] Request (main): 200 GET https://cinder-public-openstack.apps-crc.testing/v3/os-services?binary=cinder-backup 0.170s\e[00m" - "2026-02-27 10:06:02.313 13 DEBUG config_tempest.constants [-] Setting [volume-feature-enabled] backup = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.340 13 DEBUG config_tempest.constants [-] Setting [service_available] horizon = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_v2 = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_v3 = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] api_v1 = False set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.341 13 DEBUG config_tempest.constants [-] Setting [image-feature-enabled] api_v2 = True set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [identity-feature-enabled] api_extensions = OS-FEDERATION,OS-OAUTH2,s3tokens,OS-EC2,OS-OAUTH1,OS-PKI,OS-INHERIT,OS-ENDPOINT-POLICY,OS-TRUST,OS-SIMPLE-CERT,OS-EP-FILTER,OS-REVOKE set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [network-feature-enabled] api_extensions = address-group,address-scope,agent,allowed-address-pairs,auto-allocated-topology,availability_zone,default-subnetpools,dhcp_agent_scheduler,dns-integration,dns-domain-ports,dns-integration-domain-keywords,expose-port-forwarding-in-fip,external-net,extra_dhcp_opt,extraroute,filter-validation,floating-ip-port-forwarding-description,floating-ip-port-forwarding-detail,floating-ip-port-forwarding-port-ranges,fip-port-details,flavors,floating-ip-port-forwarding,floatingip-pools,ip_allocation,l2_adjacency,router,ext-gw-mode,logging,multi-provider,net-mtu,net-mtu-writable,network_availability_zone,network-ip-availability,pagination,port-device-profile,port-mac-address-regenerate,port-numa-affinity-policy,port-resource-request,port-resource-request-groups,binding,binding-extended,port-security,project-id,provider,qos,qos-bw-limit-direction,qos-bw-minimum-ingress,qos-default,qos-fip,qos-gateway-ip,qos-port-network-policy,qos-pps-minimum,qos-pps-minimum-rule-alias,qos-pps,qos-rule-type-details,qos-rule-type-filter,qos-rules-alias,quota-check-limit,quotas,quota_details,rbac-policies,rbac-address-scope,rbac-security-groups,revision-if-match,standard-attr-revisions,router_availability_zone,security-groups-normalized-cidr,security-groups-remote-address-group,security-groups-shared-filtering,security-group,segment,segments-peer-subnet-host-routes,service-type,sorting,standard-attr-segment,standard-attr-description,stateful-security-group,subnet-dns-publish-fixed-ip,subnet-segmentid-writable,subnet-service-types,subnet_allocation,subnetpool-prefix-ops,standard-attr-tag,standard-attr-timestamp,trunk,trunk-details set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [object-storage-feature-enabled] discoverable_apis = symlink,versioned_writes,slo,account_quotas,container_quotas,staticweb,s3api,formpost,ratelimit,tempurl,bulk_upload,bulk_delete set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.370 13 DEBUG config_tempest.constants [-] Setting [volume-feature-enabled] api_extensions = os-admin-actions,os-availability-zone,backups,capabilities,cgsnapshots,consistencygroups,os-extended-services,os-extended-snapshot-attributes,os-hosts,qos-specs,os-quota-class-sets,os-quota-sets,OS-SCH-HNT,scheduler-stats,os-services,os-snapshot-actions,os-snapshot-manage,os-snapshot-unmanage,os-types-extra-specs,os-types-manage,os-used-limits,os-volume-actions,os-volume-encryption-metadata,os-vol-host-attr,os-vol-image-meta,os-volume-manage,os-vol-mig-status-attr,os-vol-tenant-attr,os-volume-transfer,os-volume-type-access,encryption,os-volume-unmanage set /usr/lib/python3.9/site-packages/config_tempest/tempest_conf.py:105\e[00m" - "2026-02-27 10:06:02.370 13 INFO config_tempest.constants [-] Creating configuration file /var/lib/tempest/openshift/etc/tempest.conf\e[00m" - '{0} tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops [26.573689s] ... FAILED' - '' - 'Captured traceback:' - ~~~~~~~~~~~~~~~~~~~ - ' Traceback (most recent call last):' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/utils/__init__.py", line 65, in wrapper' - ' return f(*func_args, **func_kwargs)' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/scenario/test_server_basic_ops.py", line 127, in test_server_basic_ops' - ' self.instance = self.create_server(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/scenario/manager.py", line 349, in create_server' - ' body, _ = compute.create_test_server(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/compute.py", line 359, in create_test_server' - ' LOG.exception(''Server %s failed to delete in time'',' - '' - ' File "/usr/lib/python3.9/site-packages/oslo_utils/excutils.py", line 227, in __exit__' - ' self.force_reraise()' - '' - ' File "/usr/lib/python3.9/site-packages/oslo_utils/excutils.py", line 200, in force_reraise' - ' raise self.value' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/compute.py", line 323, in create_test_server' - ' server = waiters.wait_for_server_status(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/waiters.py", line 80, in wait_for_server_status' - ' raise exceptions.BuildErrorException(details, server_id=server_id)' - '' - ' tempest.exceptions.BuildErrorException: Server b30c813d-5a37-43fe-b947-3b4677312897 failed to build and is in ERROR status' - 'Details: Fault: {''code'': 500, ''created'': ''2026-02-27T10:06:50Z'', ''message'': ''No valid host was found. There are not enough hosts available.''}. Request ID of server operation performed before checking the server status req-73e02585-d6fb-4e43-b8df-7fbb912e9fad.' - '' - '' - 'Captured pythonlogging:' - ~~~~~~~~~~~~~~~~~~~~~~~ - ' 2026-02-27 10:06:31,318 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.418s' - '2026-02-27 10:06:31,318 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"keypair": {"name": "tempest-TestServerBasicOps-60721501", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg=="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:30 GMT'', ''server'': ''Apache'', ''content-length'': ''395'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-02a25c96-f41f-4a1a-8444-0086eac38212'', ''x-compute-request-id'': ''req-02a25c96-f41f-4a1a-8444-0086eac38212'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs''}' - ' Body: b''{"keypair": {"name": "tempest-TestServerBasicOps-60721501", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==", "fingerprint": "b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70", "user_id": "3e57fb072f774ce0a351fafc32a340fb"}}''' - '2026-02-27 10:06:32,324 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 1.003s' - '2026-02-27 10:06:32,324 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group": {"name": "tempest-secgroup-smoke-1910478022", "description": "tempest-secgroup-smoke-1910478022 description", "project_id": "2a822d4c0aca41959976634e55c51931"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:32 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''1609'', ''x-openstack-request-id'': ''req-5eb69fd3-077e-475b-a2ff-95739e17c1bd'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups''}' - ' Body: b''{"security_group": {"id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "name": "tempest-secgroup-smoke-1910478022", "stateful": true, "tenant_id": "2a822d4c0aca41959976634e55c51931", "description": "tempest-secgroup-smoke-1910478022 description", "shared": false, "security_group_rules": [{"id": "425d9a02-931e-4802-a215-61da7ba99a00", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 38, "description": null, "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}, {"id": "6c797223-133f-4493-b8cc-e764ad131123", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cid' - ' r": null, "remote_group_id": null, "standard_attr_id": 37, "description": null, "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}], "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 1, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:33,418 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 1.092s' - '2026-02-27 10:06:33,418 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:33 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''565'', ''x-openstack-request-id'': ''req-a93c8299-bcfb-4d09-aa92-ab0375b6e562'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "55771be5-66b2-417d-a1c3-a275dc1a3dc5", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:33Z", "updated_at": "2026-02-27T10:06:33Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:34,319 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.900s' - '2026-02-27 10:06:34,319 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:34 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''564'', ''x-openstack-request-id'': ''req-413511b8-f24e-44b2-8113-6250949a2a9c'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "2a69b865-78f6-4cb5-9392-c58f02fd4a28", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:34Z", "updated_at": "2026-02-27T10:06:34Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:35,164 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.844s' - 2026-02-27 10:06:35,165 16 DEBUG [tempest.lib.common.rest_client] Request - Header - ' s: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:35 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''570'', ''x-openstack-request-id'': ''req-d7ac7743-3668-4600-8e71-d75e94fa9784'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "75321a6b-0e2d-4710-bbe0-677c137a9be6", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:34Z", "updated_at": "2026-02-27T10:06:34Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:36,091 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.926s' - '2026-02-27 10:06:36,092 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:36 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''569'', ''x-openstack-request-id'': ''req-188e40b8-3b8c-41ef-97f1-85ecfa4da46e'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "3763ac3a-b930-4772-803b-5ec85e8a09e3", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:35Z", "updated_at": "2026-02-27T10:06:35Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:36,475 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.382s' - '2026-02-27 10:06:36,475 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "ethertype": "IPv6", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:36 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''575'', ''x-openstack-request-id'': ''req-e1914988-1bd8-4fc9-a517-5fef8621d9e6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/securi' - ' ty-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "4be2fa91-c334-45fc-86ae-7a5e03c8160d", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "ingress", "protocol": "ipv6-icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:36Z", "updated_at": "2026-02-27T10:06:36Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:37,134 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.658s' - '2026-02-27 10:06:37,135 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "ethertype": "IPv6", "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''574'', ''x-openstack-request-id'': ''req-5dae4c86-0894-4cbd-9169-9112dece477e'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "6149565f-213a-4114-8f88-0f6bbee9f546", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "egress", "protocol": "ipv6-icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:36Z", "updated_at": "2026-02-27T10:06:36Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:37,622 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.441s' - '2026-02-27 10:06:37,622 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json''}' - ' Body: ' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-length'': ''4724'', ''x-subject-token'': '''', ''vary'': ''X-Auth-Token'', ''x-openstack-request-id'': ''req-cd01e0ec-839b-4ca5-a619-449021e0e6d4'', ''content-type'': ''application/json'', ''set-cookie'': ''b5697f82cf3c19ece8be533395142512=22cd4304560c1ef561b47119152b55db; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens''}' - ' Body: b''{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3e57fb072f774ce0a351fafc32a340fb", "name": "tempest-TestServerBasicOps-1404073125-project-member", "password_expires_at": null}, "audit_ids": ["MPv4SFyiQjGgcUJVCZ-gZw"], "expires_at": "2026-02-27T11:06:37.000000Z", "issued_at": "2026-02-27T10:06:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2a822d4c0aca41959976634e55c51931", "name": "tempest-TestServerBasicOps-1404073125"}, "is_domain": false, "roles": [{"id": "8c30652b7d594ba08185d9be03965b06", "name": "member"}, {"id": "0d51bc8335fb41c2921912dff3e6a896", "name": "reader"}], "catalog": [{"endpoints": [{"name": "nova", "id": "2c7400dac72c4dd5b8bf0643b4f321cd", "interface": "internal", "region_id": "regionOne", "url": "https://nova-internal.openstack.svc:8774/v2.1", "region": "regionO' - ' ne"}, {"name": "nova", "id": "de307f55a1bd4ee6a957b8d81678b29c", "interface": "public", "region_id": "regionOne", "url": "https://nova-public-openstack.apps-crc.testing/v2.1", "region": "regionOne"}], "id": "22bcbaa64ec244c8a8645d41cfe97a1d", "type": "compute", "name": "nova"}, {"endpoints": [{"name": "neutron", "id": "22da66fef0bd4b938a5a963d95415995", "interface": "public", "region_id": "regionOne", "url": "https://neutron-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "neutron", "id": "516c42c793834c6594c83ac7f225cf34", "interface": "internal", "region_id": "regionOne", "url": "https://neutron-internal.openstack.svc:9696", "region": "regionOne"}], "id": "316f206b5f054e2587809cab7b01e204", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "082c0993bc074baa87f4babd0f97c8a7", "interface": "public", "region_id": "regionOne", "url": "https://keystone-public-openstack.apps-crc.testing", "region": "regionOne"}, {"id": "39eb4c69af234ec491d604200460541f", "interface": "internal", "region_id": "regionOne", "url": "https://keystone-internal.openstack.svc:5000", "region": "regionOne"}], "id": "3712ae399fd74a788e85008f2d7cbd4e", "type": "identity", "name": "keystone"}, {"endpoints": [{"name": "placement", "id": "0f96c2ef099d48c792c33dc104fab435", "interface": "public", "region_id": "regionOne", "url": "https://placement-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "placement", "id": "1a90ab5e11084ec1b129c6aecd35261c", "interface": "internal", "region_id": "regionOne", "url": "https://placement-internal.openstack.svc:8778", "region": "regionOne"}], "id": "71beb82bfec54ab29d5dfcd81fcb3680", "type": "placement", "name": "placement"}, {"endpoints": [{"name": "cinderv3", "id": "bc8957a89d0242419565581d51a118d4", "interface": "internal", "region_id": "regionOne", "url": "https://cinder-internal.openstack.svc:8776/v3", "region": "regionOne"}, {"name": "cinderv3", "id": "c16edbf8573e43a1867a1ae3675ff6d9", "interface": "public", "region_id": "regionOne", "url": "https://cinder-public-openstack.apps-crc.testing/v3", "region": "regionOne"}], "id": "787c98708a7c4528a344419059ff2d05", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"name": "glance", "id": "2accf96d1f3c4210ae8603638d7c5941", "interface": "public", "region_id": "regionOne", "url": "https://glance-default-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "glance", "id": "72977d746e0543128f7d353b7bc8ea64", "interface": "internal", "region_id": "regionOne", "url": "https://glance-default-internal.openstack.svc:9292", "region": "regionOne"}], "id": "7e20e463502642c29be0e94fb041b188", "type": "image", "name": "glance"}, {"endpoints": [], "id": "8c2d47f49dad454ea68f7aac0e8f445f", "type": "Ceilometer", "name": "ceilometer"}, {"endpoints": [{"name": "swift", "id": "af354d0948e742faa3639a3a9a1bc6b2", "interface": "public", "region_id": "regionOne", "url": "https://swift-public-openstack.apps-crc.testing/v1/AUTH_2a822d4c0aca41959976634e55c51931", "region": "regionOne"}, {"name": "swift", "id": "d7f2fd36f2ca4ab5ad3ae59990bd2210", "interface": "internal", "region_id": "regionOne", "url": "https://swift-internal.openstack.svc:8080/v1/AUTH_2a822d4' - '2026-02-27 10:06:37,623 16 INFO [tempest.lib.common.fixed_network] (TestServerBasicOps:test_server_basic_ops) Found network {''id'': ''8cc13bc4-6f9e-4cac-846d-020c9a7beb8b'', ''name'': ''tempest-TestServerBasicOps-2054800424-network'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''admin_state_up'': True, ''mtu'': 1442, ''status'': ''ACTIVE'', ''subnets'': [], ''shared'': False, ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''qos_policy_id'': None, ''port_security_enabled'': True, ''dns_domain'': '''', ''router:external'': False, ''provider:network_type'': ''geneve'', ''provider:physical_network'': None, ''provider:segmentation_id'': 31271, ''is_default'': False, ''availability_zone_hints'': [], ''availability_zones'': [], ''ipv4_address_scope'': None, ''ipv6_address_scope'': None, ''description'': '''', ''l2_adjacency'': True, ''tags'': [], ''created_at'': ''2026-02-27T10:06:09Z'', ''updated_at'': ''2026-02-27T10:0' - ' 6:09Z'', ''revision_number'': 1} available for tenant' - 2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested setup of ValidationResources keypair True, floating IP True, security group True - 2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested validation resources keypair True, floating IP True, security group True - '2026-02-27 10:06:37,884 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.258s' - '2026-02-27 10:06:37,884 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"keypair": {"name": "tempest-keypair-2079157794", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg=="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-length'': ''386'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-b6e6fa30-3a79-4247-8964-48009b91631c'', ''x-compute-request-id'': ''req-b6e6fa30-3a79-4247-8964-48009b91631c'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs''}' - ' Body: b''{"keypair": {"name": "tempest-keypair-2079157794", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==", "fingerprint": "54:6e:d0:96:19:d8:4c:ae:c5:1f:b8:ac:47:77:60:10", "user_id": "3e57fb072f774ce0a351fafc32a340fb"}}''' - 2026-02-27 10:06:37,887 16 DEBUG [tempest.lib.common.validation_resources] Validation resource key tempest-keypair-2079157794 created - '2026-02-27 10:06:38,287 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 0.399s' - '2026-02-27 10:06:38,288 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group": {"name": "tempest-securitygroup--421385732", "description": "tempest-description--313145705"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:38 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''1593'', ''x-openstack-request-id'': ''req-4313901c-8faa-4877-b497-75794b84d306'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups''}' - ' Body: b''{"security_group": {"id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "name": "tempest-securitygroup--421385732", "stateful": true, "tenant_id": "2a822d4c0aca41959976634e55c51931", "description": "tempest-description--313145705", "shared": false, "security_group_rules": [{"id": "5b2a06a5-c520-4a75-b11f-9104010eaa4b", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 47, "description": null, "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_nu' - ' mber": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}, {"id": "e5c049e2-faf4-427f-9768-c5471c17c997", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 46, "description": null, "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}], "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 1, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:38,682 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.394s' - '2026-02-27 10:06:38,683 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "protocol": "tcp", "ethertype": "IPv4", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:38 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''565'', ''x-openstack-request-id'': ''req-84ebbc00-fc38-4f86-8e42-6867681c191d'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "f5705e25-6c44-4a28-a5bb-40f716fd737e", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:39,025 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.341s' - '2026-02-27 10:06:39,025 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "protocol": "icmp", "ethertype": "IPv4", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:39 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''570'', ''x-openstack-request-id'': ''req-b9e11227-d89c-4e7d-8c86-6d86afc1c7f0'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "e00f6958-e64c-4278-8844-fed96af8d3c4", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - 2026-0 - ' 2-27 10:06:39,026 16 DEBUG [tempest.lib.common.validation_resources] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--421385732 created' - '2026-02-27 10:06:40,459 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips 1.428s' - '2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"floatingip": {"floating_network_id": "ee418dcf-f8c2-433e-89a5-174f0da48e20"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:40 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''578'', ''x-openstack-request-id'': ''req-353deff8-98d3-4a42-b658-b435c9b00466'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips''}' - ' Body: b''{"floatingip": {"id": "16090d1d-102a-4fbe-bde7-07ed95789524", "tenant_id": "2a822d4c0aca41959976634e55c51931", "floating_ip_address": "192.168.122.215", "floating_network_id": "ee418dcf-f8c2-433e-89a5-174f0da48e20", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "2a822d4c0aca41959976634e55c51931", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2026-02-27T10:06:39Z", "updated_at": "2026-02-27T10:06:39Z", "revision_number": 0}}''' - '2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.validation_resources] Validation resource floating IP {''id'': ''16090d1d-102a-4fbe-bde7-07ed95789524'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''floating_ip_address'': ''192.168.122.215'', ''floating_network_id'': ''ee418dcf-f8c2-433e-89a5-174f0da48e20'', ''router_id'': None, ''port_id'': None, ''fixed_ip_address'': None, ''status'': ''DOWN'', ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': '''', ''qos_policy_id'': None, ''port_details'': None, ''dns_domain'': '''', ''dns_name'': '''', ''port_forwardings'': [], ''tags'': [], ''created_at'': ''2026-02-27T10:06:39Z'', ''updated_at'': ''2026-02-27T10:06:39Z'', ''revision_number'': 0, ''ip'': ''192.168.122.215''} created' - '2026-02-27 10:06:40,462 16 DEBUG [tempest.common.compute] Provisioning test server with validation resources {''keypair'': {''name'': ''tempest-TestServerBasicOps-60721501'', ''public_key'': ''ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg=='', ''fingerprint'': ''b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70'', ''user_id'': ''3e57fb072f774ce0a351fafc32a340fb'', ''private_key'': ''-----BEGIN EC PRIVATE KEY-----\nMIGkAgEBBDAcLFYx7ONSnZn3afsB/miKAnRQeTRccBMIgRyPIuh5fiOvsbiUw3/U\n2uFHLRudXuqgBwYFK4EEACKhZANiAARxxR3bCZ+fdp8fu3ERv3Vti8JPOjgl1Nnn\nIFn4VZp5vx3et19WlX6i5Y27XX4IkFgIx+Zr0hHXiGRqc72LjkyHsBegPMcfg76I\nMikIZM+KfUGWAaNxd40aluxhPRihz44=\n-----END EC PRIVATE KEY-----\n''}, ''security_group'': {''id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''name'': ''tempest-securitygroup--421385732'', ''stateful'': True, ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': ''tempest-description--313145705'', ''shared'': False, ''security_group_rules'': [{''id'': ''5b2a06a5-c520-4a75-b11f-9104010eaa4b'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''security_group_id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''ethertype'': ''IPv6'', ''direction'': ''egress'', ''protocol'': None, ''port_range_min'': None, ''port_range_max'': None, ''remote_ip_prefix'': None, ''remote_address_group_id'': None, ''normalized_cidr'': None, ''remote_group_id'': None, ''standard_attr_id'': 47, ''description'': None, ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 0, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}, {''i' - ' d'': ''e5c049e2-faf4-427f-9768-c5471c17c997'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''security_group_id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''ethertype'': ''IPv4'', ''direction'': ''egress'', ''protocol'': None, ''port_range_min'': None, ''port_range_max'': None, ''remote_ip_prefix'': None, ''remote_address_group_id'': None, ''normalized_cidr'': None, ''remote_group_id'': None, ''standard_attr_id'': 46, ''description'': None, ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 0, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}], ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 1, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}, ''floating_ip'': {''id'': ''16090d1d-102a-4fbe-bde7-07ed95789524'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''floating_ip_address'': ''192.168.122.215'', ''floating_network_id'': ''ee418dcf-f8c2-433e-89a5-174f0da48e20'', ''router_id'': None, ''port_id'': None, ''fixed_ip_address'': None, ''status'': ''DOWN'', ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': '''', ''qos_policy_id'': None, ''port_details'': None, ''dns_domain'': '''', ''dns_name'': '''', ''port_forwardings'': [], ''tags'': [], ''created_at'': ''2026-02-27T10:06:39Z'', ''updated_at'': ''2026-02-27T10:06:39Z'', ''revision_number'': 0, ''ip'': ''192.168.122.215''}}' - '2026-02-27 10:06:48,732 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 202 POST https://nova-public-openstack.apps-crc.testing/v2.1/servers 8.269s' - '2026-02-27 10:06:48,733 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"server": {"name": "tempest-TestServerBasicOps-server-83084592", "imageRef": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "flavorRef": "3070fbcb-76a6-487a-9634-3b061cf48b92", "security_groups": [{"name": "tempest-secgroup-smoke-1910478022"}, {"name": "tempest-securitygroup--421385732"}], "config_drive": true, "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "key_name": "tempest-TestServerBasicOps-60721501", "networks": [{"uuid": "8cc13bc4-6f9e-4cac-846d-020c9a7beb8b"}], "user_data": "IyEvYmluL3NoCmVjaG8gIlByaW50aW5nIGNpcnJvcyB1c2VyIGF1dGhvcml6ZWQga2V5cyIKY2F0IH5jaXJyb3MvLnNzaC9hdXRob3JpemVkX2tleXMgfHwgdHJ1ZQo="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:40 GMT'', ''server'': ''Apache'', ''content-length'': ''492'', ''location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-73e02585-d6fb-4e43-b8df-7fbb912e9fad'', ''x-compute-request-id'': ''req-73e02585-d6fb-4e43-b8df-7fbb912e9fad'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "tempest-secgroup-smoke-1910478022"}, {"name": "tempest-securitygroup--421385732"}], "adminPass": "LNtGjhXTZ4WY"}}''' - '2026-02-27 10:06:50,126 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.390s' - '2026-02-27 10:06:50,126 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json''' - ' , ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:48 GMT'', ''server'': ''Apache'', ''content-length'': ''1445'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5'', ''x-compute-request-id'': ''req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "name": "tempest-TestServerBasicOps-server-83084592", "status": "BUILD", "tenant_id": "2a822d4c0aca41959976634e55c51931", "user_id": "3e57fb072f774ce0a351fafc32a340fb", "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "hostId": "", "image": {"id": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2"}]}, "flavor": {"id": "3070fbcb-76a6-487a-9634-3b061cf48b92", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92"}]}, "created": "2026-02-27T10:06:48Z", "updated": "2026-02-27T10:06:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "True", "key_name": "tempest-TestServerBasicOps-60721501", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}''' - '2026-02-27 10:06:52,190 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.056s' - '2026-02-27 10:06:52,190 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:51 GMT'', ''server'': ''Apache'', ''content-length'': ''1555'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-6ac524ec-4d4c-4377-977c-2ce36fa90605'', ''x-compute-request-id'': ''req-6ac524ec-4d4c-4377-977c-2ce36fa90605'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "name": "tempest-TestServerBasicOps-server-83084592", "status": "ERROR", "tenant_id": "2a822d4c0aca41959976634e55c51931", "user_id": "3e57fb072f774ce0a351fafc32a340fb", "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "hostId": "", "image": {"id": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2"}]}, "flavor": {"id": "3070fbcb-76a6-487a-9634-3b061cf48b92", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-' - ' crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92"}]}, "created": "2026-02-27T10:06:48Z", "updated": "2026-02-27T10:06:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "fault": {"code": 500, "created": "2026-02-27T10:06:50Z", "message": "No valid host was found. There are not enough hosts available."}, "OS-EXT-AZ:availability_zone": "", "config_drive": "True", "key_name": "tempest-TestServerBasicOps-60721501", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "error", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}''' - 2026-02-27 10:06:52,199 16 INFO [tempest.common.waiters] State transition "BUILD/scheduling" ==> "ERROR/None" after 2 second wait - '2026-02-27 10:06:53,985 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 204 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.786s' - '2026-02-27 10:06:53,986 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:52 GMT'', ''server'': ''Apache'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-1119f923-1f00-41b2-9b04-1e1f44c2549f'', ''x-compute-request-id'': ''req-1119f923-1f00-41b2-9b04-1e1f44c2549f'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''''' - '2026-02-27 10:06:54,089 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 404 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 0.103s' - '2026-02-27 10:06:54,090 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:53 GMT'', ''server'': ''Apache'', ''content-length'': ''111'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-3b13b63a-a351-47ca-abc8-aac925ae6a3b'', ''x-compute-request-id'': ''req-3b13b63a-a351-47ca-abc8-aac925ae6a3b'', ''content-type'': ''application/json; charset=UTF-8'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''404'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"itemNotFound": {"code": 404, "message": "Instance b30c813d-5a37-43fe-b947-3b4677312897 could not be found."}}''' - '2026-02-27 10:06:54,261 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794 0.168s' - '2026-02-27 10:06:54,262 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:54 GMT'', ''server'': ''Apache'', ''content-len' - ' gth'': ''0'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-e97a40d7-e0bd-47f7-ab22-66843ac5c096'', ''x-compute-request-id'': ''req-e97a40d7-e0bd-47f7-ab22-66843ac5c096'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794''}' - ' Body: b''''' - '2026-02-27 10:06:55,442 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 1.180s' - '2026-02-27 10:06:55,443 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:55 GMT'', ''server'': ''Apache'', ''x-openstack-request-id'': ''req-b10c39cf-8668-4352-b585-4aa7f87cc4eb'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8''}' - ' Body: b''''' - '2026-02-27 10:06:56,104 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 404 GET https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 0.660s' - '2026-02-27 10:06:56,104 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:56 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''146'', ''x-openstack-request-id'': ''req-d569e154-39fe-4873-ac84-7e2b91f621f6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''404'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8''}' - ' Body: b''{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 384f2878-b9a1-45d0-beeb-7aaf4782d0c8 does not exist", "detail": ""}}''' - '2026-02-27 10:06:57,000 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524 0.895s' - '2026-02-27 10:06:57,001 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:56 GMT'', ''server'': ''Apache'', ''x-openstack-request-id'': ''req-66c92945-9575-4aa5-bd70-9d2f432b5fc6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524''}' - ' Body: b''''' - '2026-02-27 10:06:57,330 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51 0.321s' - '2026-02-27 10:06:57,330 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:57 GMT'', ''server'': ''Apache'', ''x-openstack-requ' - ' est-id'': ''req-0530235f-29f4-4ad4-9297-a9b4213d1992'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51''}' - ' Body: b''''' - '2026-02-27 10:06:57,469 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501 0.138s' - '2026-02-27 10:06:57,470 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:57 GMT'', ''server'': ''Apache'', ''content-length'': ''0'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1'', ''x-compute-request-id'': ''req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501''}' - ' Body: b''''' - '' - '' - ============================== - 'Failed 1 tests - output below:' - ============================== - '' - tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops[compute,id-7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba,network,smoke] - '----------------------------------------------------------------------------------------------------------------------------------------------' - '' - 'Captured traceback:' - ~~~~~~~~~~~~~~~~~~~ - ' Traceback (most recent call last):' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/utils/__init__.py", line 65, in wrapper' - ' return f(*func_args, **func_kwargs)' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/scenario/test_server_basic_ops.py", line 127, in test_server_basic_ops' - ' self.instance = self.create_server(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/scenario/manager.py", line 349, in create_server' - ' body, _ = compute.create_test_server(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/compute.py", line 359, in create_test_server' - ' LOG.exception(''Server %s failed to delete in time'',' - '' - ' File "/usr/lib/python3.9/site-packages/oslo_utils/excutils.py", line 227, in __exit__' - ' self.force_reraise()' - '' - ' File "/usr/lib/python3.9/site-packages/oslo_utils/excutils.py", line 200, in force_reraise' - ' raise self.value' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/compute.py", line 323, in create_test_server' - ' server = waiters.wait_for_server_status(' - '' - ' File "/usr/lib/python3.9/site-packages/tempest/common/waiters.py", line 80, in wait_for_server_status' - ' raise exceptions.BuildErrorException(details, server_id=server_id)' - '' - ' tempest.exceptions.BuildErrorException: Server b30c813d-5a37-43fe-b947-3b4677312897 failed to build and is in ERROR status' - 'Details: Fault: {''code'': 500, ''created'': ''2026-02-27T10:06:50Z'', ''message'': ''No valid host was found. There are not enough hosts available.''}. Request ID of server operation performed before checking the server status req-73e02585-d6fb-4e43-b8df-7fbb912e9fad.' - '' - '' - 'Captured pythonlogging:' - ~~~~~~~~~~~~~~~~~~~~~~~ - ' 2026-02-27 10:06:31,318 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.418s' - '2026-02-27 10:06:31,318 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"keypair": {"name": "tempest-TestServerBasicOps-60721501", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg=="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:30 GMT'', ''server'': ''Apache'', ''content-length'': ''395'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-02a25c96-f41f-4a1a-8444-0086eac38212'', ''x-compute-request-id'': ''req-02a25c96-f41f-4a1a-8444-0086eac38212'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs''}' - ' Body: b''{"keypair": {"name": "tempest-TestServerBasicOps-60721501", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg==", "fingerprint": "b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70", "user_id": "3e57fb072f774ce0a351fafc32a340fb"}}''' - '2026-02-27 10:06:32,324 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 1.003s' - '2026-02-27 10:06:32,324 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group": {"name": "tempest-secgroup-smoke-1910478022", "description": "tempest-secgroup-smoke-1910478022 description", "project_id": "2a822d4c0aca41959976634e55c51931"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:32 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''1609'', ''x-openstack-request-id'': ''req-5eb69fd3-077e-475b-a2ff-95739e17c1bd'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups''}' - ' Body: b''{"security_group": {"id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "name": "tempest-secgroup-smoke-1910478022", "stateful": true, "tenant_id": "2a822d4c0aca41959976634e55c51931", "description": "tempest-secgroup-smoke-1910478022 description", "shared": false, "security_group_rules": [{"id": "425d9a02-931e-4802-a215-61da7ba99a00", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 38, "description": null, "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}, {"id": "6c797223-133f-4493-b8cc-e764ad131123", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cid' - ' r": null, "remote_group_id": null, "standard_attr_id": 37, "description": null, "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}], "tags": [], "created_at": "2026-02-27T10:06:32Z", "updated_at": "2026-02-27T10:06:32Z", "revision_number": 1, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:33,418 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 1.092s' - '2026-02-27 10:06:33,418 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:33 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''565'', ''x-openstack-request-id'': ''req-a93c8299-bcfb-4d09-aa92-ab0375b6e562'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "55771be5-66b2-417d-a1c3-a275dc1a3dc5", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:33Z", "updated_at": "2026-02-27T10:06:33Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:34,319 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.900s' - '2026-02-27 10:06:34,319 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:34 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''564'', ''x-openstack-request-id'': ''req-413511b8-f24e-44b2-8113-6250949a2a9c'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "2a69b865-78f6-4cb5-9392-c58f02fd4a28", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:34Z", "updated_at": "2026-02-27T10:06:34Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:35,164 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.844s' - 2026-02-27 10:06:35,165 16 DEBUG [tempest.lib.common.rest_client] Request - Header - ' s: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:35 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''570'', ''x-openstack-request-id'': ''req-d7ac7743-3668-4600-8e71-d75e94fa9784'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "75321a6b-0e2d-4710-bbe0-677c137a9be6", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:34Z", "updated_at": "2026-02-27T10:06:34Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:36,091 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.926s' - '2026-02-27 10:06:36,092 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:36 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''569'', ''x-openstack-request-id'': ''req-188e40b8-3b8c-41ef-97f1-85ecfa4da46e'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "3763ac3a-b930-4772-803b-5ec85e8a09e3", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv4", "direction": "egress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:35Z", "updated_at": "2026-02-27T10:06:35Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:36,475 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.382s' - '2026-02-27 10:06:36,475 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "ethertype": "IPv6", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:36 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''575'', ''x-openstack-request-id'': ''req-e1914988-1bd8-4fc9-a517-5fef8621d9e6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/securi' - ' ty-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "4be2fa91-c334-45fc-86ae-7a5e03c8160d", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "ingress", "protocol": "ipv6-icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:36Z", "updated_at": "2026-02-27T10:06:36Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:37,134 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.658s' - '2026-02-27 10:06:37,135 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "project_id": "2a822d4c0aca41959976634e55c51931", "protocol": "icmp", "ethertype": "IPv6", "direction": "egress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''574'', ''x-openstack-request-id'': ''req-5dae4c86-0894-4cbd-9169-9112dece477e'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "6149565f-213a-4114-8f88-0f6bbee9f546", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "1ce27349-eaf2-421f-9a32-2785f562cc51", "ethertype": "IPv6", "direction": "egress", "protocol": "ipv6-icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:36Z", "updated_at": "2026-02-27T10:06:36Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:37,622 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 201 POST https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens 0.441s' - '2026-02-27 10:06:37,622 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json''}' - ' Body: ' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-length'': ''4724'', ''x-subject-token'': '''', ''vary'': ''X-Auth-Token'', ''x-openstack-request-id'': ''req-cd01e0ec-839b-4ca5-a619-449021e0e6d4'', ''content-type'': ''application/json'', ''set-cookie'': ''b5697f82cf3c19ece8be533395142512=22cd4304560c1ef561b47119152b55db; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://keystone-public-openstack.apps-crc.testing/v3/auth/tokens''}' - ' Body: b''{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3e57fb072f774ce0a351fafc32a340fb", "name": "tempest-TestServerBasicOps-1404073125-project-member", "password_expires_at": null}, "audit_ids": ["MPv4SFyiQjGgcUJVCZ-gZw"], "expires_at": "2026-02-27T11:06:37.000000Z", "issued_at": "2026-02-27T10:06:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2a822d4c0aca41959976634e55c51931", "name": "tempest-TestServerBasicOps-1404073125"}, "is_domain": false, "roles": [{"id": "8c30652b7d594ba08185d9be03965b06", "name": "member"}, {"id": "0d51bc8335fb41c2921912dff3e6a896", "name": "reader"}], "catalog": [{"endpoints": [{"name": "nova", "id": "2c7400dac72c4dd5b8bf0643b4f321cd", "interface": "internal", "region_id": "regionOne", "url": "https://nova-internal.openstack.svc:8774/v2.1", "region": "regionO' - ' ne"}, {"name": "nova", "id": "de307f55a1bd4ee6a957b8d81678b29c", "interface": "public", "region_id": "regionOne", "url": "https://nova-public-openstack.apps-crc.testing/v2.1", "region": "regionOne"}], "id": "22bcbaa64ec244c8a8645d41cfe97a1d", "type": "compute", "name": "nova"}, {"endpoints": [{"name": "neutron", "id": "22da66fef0bd4b938a5a963d95415995", "interface": "public", "region_id": "regionOne", "url": "https://neutron-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "neutron", "id": "516c42c793834c6594c83ac7f225cf34", "interface": "internal", "region_id": "regionOne", "url": "https://neutron-internal.openstack.svc:9696", "region": "regionOne"}], "id": "316f206b5f054e2587809cab7b01e204", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "082c0993bc074baa87f4babd0f97c8a7", "interface": "public", "region_id": "regionOne", "url": "https://keystone-public-openstack.apps-crc.testing", "region": "regionOne"}, {"id": "39eb4c69af234ec491d604200460541f", "interface": "internal", "region_id": "regionOne", "url": "https://keystone-internal.openstack.svc:5000", "region": "regionOne"}], "id": "3712ae399fd74a788e85008f2d7cbd4e", "type": "identity", "name": "keystone"}, {"endpoints": [{"name": "placement", "id": "0f96c2ef099d48c792c33dc104fab435", "interface": "public", "region_id": "regionOne", "url": "https://placement-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "placement", "id": "1a90ab5e11084ec1b129c6aecd35261c", "interface": "internal", "region_id": "regionOne", "url": "https://placement-internal.openstack.svc:8778", "region": "regionOne"}], "id": "71beb82bfec54ab29d5dfcd81fcb3680", "type": "placement", "name": "placement"}, {"endpoints": [{"name": "cinderv3", "id": "bc8957a89d0242419565581d51a118d4", "interface": "internal", "region_id": "regionOne", "url": "https://cinder-internal.openstack.svc:8776/v3", "region": "regionOne"}, {"name": "cinderv3", "id": "c16edbf8573e43a1867a1ae3675ff6d9", "interface": "public", "region_id": "regionOne", "url": "https://cinder-public-openstack.apps-crc.testing/v3", "region": "regionOne"}], "id": "787c98708a7c4528a344419059ff2d05", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"name": "glance", "id": "2accf96d1f3c4210ae8603638d7c5941", "interface": "public", "region_id": "regionOne", "url": "https://glance-default-public-openstack.apps-crc.testing", "region": "regionOne"}, {"name": "glance", "id": "72977d746e0543128f7d353b7bc8ea64", "interface": "internal", "region_id": "regionOne", "url": "https://glance-default-internal.openstack.svc:9292", "region": "regionOne"}], "id": "7e20e463502642c29be0e94fb041b188", "type": "image", "name": "glance"}, {"endpoints": [], "id": "8c2d47f49dad454ea68f7aac0e8f445f", "type": "Ceilometer", "name": "ceilometer"}, {"endpoints": [{"name": "swift", "id": "af354d0948e742faa3639a3a9a1bc6b2", "interface": "public", "region_id": "regionOne", "url": "https://swift-public-openstack.apps-crc.testing/v1/AUTH_2a822d4c0aca41959976634e55c51931", "region": "regionOne"}, {"name": "swift", "id": "d7f2fd36f2ca4ab5ad3ae59990bd2210", "interface": "internal", "region_id": "regionOne", "url": "https://swift-internal.openstack.svc:8080/v1/AUTH_2a822d4' - '2026-02-27 10:06:37,623 16 INFO [tempest.lib.common.fixed_network] (TestServerBasicOps:test_server_basic_ops) Found network {''id'': ''8cc13bc4-6f9e-4cac-846d-020c9a7beb8b'', ''name'': ''tempest-TestServerBasicOps-2054800424-network'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''admin_state_up'': True, ''mtu'': 1442, ''status'': ''ACTIVE'', ''subnets'': [], ''shared'': False, ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''qos_policy_id'': None, ''port_security_enabled'': True, ''dns_domain'': '''', ''router:external'': False, ''provider:network_type'': ''geneve'', ''provider:physical_network'': None, ''provider:segmentation_id'': 31271, ''is_default'': False, ''availability_zone_hints'': [], ''availability_zones'': [], ''ipv4_address_scope'': None, ''ipv6_address_scope'': None, ''description'': '''', ''l2_adjacency'': True, ''tags'': [], ''created_at'': ''2026-02-27T10:06:09Z'', ''updated_at'': ''2026-02-27T10:0' - ' 6:09Z'', ''revision_number'': 1} available for tenant' - 2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested setup of ValidationResources keypair True, floating IP True, security group True - 2026-02-27 10:06:37,624 16 DEBUG [tempest.lib.common.validation_resources] Requested validation resources keypair True, floating IP True, security group True - '2026-02-27 10:06:37,884 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 200 POST https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs 0.258s' - '2026-02-27 10:06:37,884 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"keypair": {"name": "tempest-keypair-2079157794", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg=="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:37 GMT'', ''server'': ''Apache'', ''content-length'': ''386'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-b6e6fa30-3a79-4247-8964-48009b91631c'', ''x-compute-request-id'': ''req-b6e6fa30-3a79-4247-8964-48009b91631c'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs''}' - ' Body: b''{"keypair": {"name": "tempest-keypair-2079157794", "public_key": "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBFE1izyI07w5C9riG0F4W2v39fOJNRf8TOfvK77pxIY7pSWDOz0Vdn9FwOj6/5y1yupseKCPGHivDzCKnokK3TBjAFYLNyKFsp4J/WcOtzw/5metCUWsL5Y1Y7jWzJ2utg==", "fingerprint": "54:6e:d0:96:19:d8:4c:ae:c5:1f:b8:ac:47:77:60:10", "user_id": "3e57fb072f774ce0a351fafc32a340fb"}}''' - 2026-02-27 10:06:37,887 16 DEBUG [tempest.lib.common.validation_resources] Validation resource key tempest-keypair-2079157794 created - '2026-02-27 10:06:38,287 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups 0.399s' - '2026-02-27 10:06:38,288 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group": {"name": "tempest-securitygroup--421385732", "description": "tempest-description--313145705"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:38 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''1593'', ''x-openstack-request-id'': ''req-4313901c-8faa-4877-b497-75794b84d306'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups''}' - ' Body: b''{"security_group": {"id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "name": "tempest-securitygroup--421385732", "stateful": true, "tenant_id": "2a822d4c0aca41959976634e55c51931", "description": "tempest-description--313145705", "shared": false, "security_group_rules": [{"id": "5b2a06a5-c520-4a75-b11f-9104010eaa4b", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 47, "description": null, "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_nu' - ' mber": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}, {"id": "e5c049e2-faf4-427f-9768-c5471c17c997", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "standard_attr_id": 46, "description": null, "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}], "tags": [], "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 1, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:38,682 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.394s' - '2026-02-27 10:06:38,683 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "protocol": "tcp", "ethertype": "IPv4", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:38 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''565'', ''x-openstack-request-id'': ''req-84ebbc00-fc38-4f86-8e42-6867681c191d'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "f5705e25-6c44-4a28-a5bb-40f716fd737e", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - '2026-02-27 10:06:39,025 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules 0.341s' - '2026-02-27 10:06:39,025 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"security_group_rule": {"security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "protocol": "icmp", "ethertype": "IPv4", "direction": "ingress"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:39 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''570'', ''x-openstack-request-id'': ''req-b9e11227-d89c-4e7d-8c86-6d86afc1c7f0'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-group-rules''}' - ' Body: b''{"security_group_rule": {"id": "e00f6958-e64c-4278-8844-fed96af8d3c4", "tenant_id": "2a822d4c0aca41959976634e55c51931", "security_group_id": "384f2878-b9a1-45d0-beeb-7aaf4782d0c8", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_address_group_id": null, "normalized_cidr": null, "remote_group_id": null, "description": "", "created_at": "2026-02-27T10:06:38Z", "updated_at": "2026-02-27T10:06:38Z", "revision_number": 0, "project_id": "2a822d4c0aca41959976634e55c51931"}}''' - 2026-0 - ' 2-27 10:06:39,026 16 DEBUG [tempest.lib.common.validation_resources] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--421385732 created' - '2026-02-27 10:06:40,459 16 INFO [tempest.lib.common.rest_client] Request (ValidationResourcesFixture:setUp): 201 POST https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips 1.428s' - '2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: {"floatingip": {"floating_network_id": "ee418dcf-f8c2-433e-89a5-174f0da48e20"}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:40 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''578'', ''x-openstack-request-id'': ''req-353deff8-98d3-4a42-b658-b435c9b00466'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''201'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips''}' - ' Body: b''{"floatingip": {"id": "16090d1d-102a-4fbe-bde7-07ed95789524", "tenant_id": "2a822d4c0aca41959976634e55c51931", "floating_ip_address": "192.168.122.215", "floating_network_id": "ee418dcf-f8c2-433e-89a5-174f0da48e20", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "2a822d4c0aca41959976634e55c51931", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2026-02-27T10:06:39Z", "updated_at": "2026-02-27T10:06:39Z", "revision_number": 0}}''' - '2026-02-27 10:06:40,460 16 DEBUG [tempest.lib.common.validation_resources] Validation resource floating IP {''id'': ''16090d1d-102a-4fbe-bde7-07ed95789524'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''floating_ip_address'': ''192.168.122.215'', ''floating_network_id'': ''ee418dcf-f8c2-433e-89a5-174f0da48e20'', ''router_id'': None, ''port_id'': None, ''fixed_ip_address'': None, ''status'': ''DOWN'', ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': '''', ''qos_policy_id'': None, ''port_details'': None, ''dns_domain'': '''', ''dns_name'': '''', ''port_forwardings'': [], ''tags'': [], ''created_at'': ''2026-02-27T10:06:39Z'', ''updated_at'': ''2026-02-27T10:06:39Z'', ''revision_number'': 0, ''ip'': ''192.168.122.215''} created' - '2026-02-27 10:06:40,462 16 DEBUG [tempest.common.compute] Provisioning test server with validation resources {''keypair'': {''name'': ''tempest-TestServerBasicOps-60721501'', ''public_key'': ''ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBHHFHdsJn592nx+7cRG/dW2Lwk86OCXU2ecgWfhVmnm/Hd63X1aVfqLljbtdfgiQWAjH5mvSEdeIZGpzvYuOTIewF6A8xx+DvogyKQhkz4p9QZYBo3F3jRqW7GE9GKHPjg=='', ''fingerprint'': ''b2:61:b5:0b:f4:6d:93:7b:0d:8d:2a:5c:35:a8:40:70'', ''user_id'': ''3e57fb072f774ce0a351fafc32a340fb'', ''private_key'': ''-----BEGIN EC PRIVATE KEY-----\nMIGkAgEBBDAcLFYx7ONSnZn3afsB/miKAnRQeTRccBMIgRyPIuh5fiOvsbiUw3/U\n2uFHLRudXuqgBwYFK4EEACKhZANiAARxxR3bCZ+fdp8fu3ERv3Vti8JPOjgl1Nnn\nIFn4VZp5vx3et19WlX6i5Y27XX4IkFgIx+Zr0hHXiGRqc72LjkyHsBegPMcfg76I\nMikIZM+KfUGWAaNxd40aluxhPRihz44=\n-----END EC PRIVATE KEY-----\n''}, ''security_group'': {''id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''name'': ''tempest-securitygroup--421385732'', ''stateful'': True, ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': ''tempest-description--313145705'', ''shared'': False, ''security_group_rules'': [{''id'': ''5b2a06a5-c520-4a75-b11f-9104010eaa4b'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''security_group_id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''ethertype'': ''IPv6'', ''direction'': ''egress'', ''protocol'': None, ''port_range_min'': None, ''port_range_max'': None, ''remote_ip_prefix'': None, ''remote_address_group_id'': None, ''normalized_cidr'': None, ''remote_group_id'': None, ''standard_attr_id'': 47, ''description'': None, ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 0, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}, {''i' - ' d'': ''e5c049e2-faf4-427f-9768-c5471c17c997'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''security_group_id'': ''384f2878-b9a1-45d0-beeb-7aaf4782d0c8'', ''ethertype'': ''IPv4'', ''direction'': ''egress'', ''protocol'': None, ''port_range_min'': None, ''port_range_max'': None, ''remote_ip_prefix'': None, ''remote_address_group_id'': None, ''normalized_cidr'': None, ''remote_group_id'': None, ''standard_attr_id'': 46, ''description'': None, ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 0, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}], ''tags'': [], ''created_at'': ''2026-02-27T10:06:38Z'', ''updated_at'': ''2026-02-27T10:06:38Z'', ''revision_number'': 1, ''project_id'': ''2a822d4c0aca41959976634e55c51931''}, ''floating_ip'': {''id'': ''16090d1d-102a-4fbe-bde7-07ed95789524'', ''tenant_id'': ''2a822d4c0aca41959976634e55c51931'', ''floating_ip_address'': ''192.168.122.215'', ''floating_network_id'': ''ee418dcf-f8c2-433e-89a5-174f0da48e20'', ''router_id'': None, ''port_id'': None, ''fixed_ip_address'': None, ''status'': ''DOWN'', ''project_id'': ''2a822d4c0aca41959976634e55c51931'', ''description'': '''', ''qos_policy_id'': None, ''port_details'': None, ''dns_domain'': '''', ''dns_name'': '''', ''port_forwardings'': [], ''tags'': [], ''created_at'': ''2026-02-27T10:06:39Z'', ''updated_at'': ''2026-02-27T10:06:39Z'', ''revision_number'': 0, ''ip'': ''192.168.122.215''}}' - '2026-02-27 10:06:48,732 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 202 POST https://nova-public-openstack.apps-crc.testing/v2.1/servers 8.269s' - '2026-02-27 10:06:48,733 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: {"server": {"name": "tempest-TestServerBasicOps-server-83084592", "imageRef": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "flavorRef": "3070fbcb-76a6-487a-9634-3b061cf48b92", "security_groups": [{"name": "tempest-secgroup-smoke-1910478022"}, {"name": "tempest-securitygroup--421385732"}], "config_drive": true, "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "key_name": "tempest-TestServerBasicOps-60721501", "networks": [{"uuid": "8cc13bc4-6f9e-4cac-846d-020c9a7beb8b"}], "user_data": "IyEvYmluL3NoCmVjaG8gIlByaW50aW5nIGNpcnJvcyB1c2VyIGF1dGhvcml6ZWQga2V5cyIKY2F0IH5jaXJyb3MvLnNzaC9hdXRob3JpemVkX2tleXMgfHwgdHJ1ZQo="}}' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:40 GMT'', ''server'': ''Apache'', ''content-length'': ''492'', ''location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-73e02585-d6fb-4e43-b8df-7fbb912e9fad'', ''x-compute-request-id'': ''req-73e02585-d6fb-4e43-b8df-7fbb912e9fad'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "tempest-secgroup-smoke-1910478022"}, {"name": "tempest-securitygroup--421385732"}], "adminPass": "LNtGjhXTZ4WY"}}''' - '2026-02-27 10:06:50,126 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.390s' - '2026-02-27 10:06:50,126 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json''' - ' , ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:48 GMT'', ''server'': ''Apache'', ''content-length'': ''1445'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5'', ''x-compute-request-id'': ''req-2995d94a-5a22-47c6-9f4f-76bca92b3ea5'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "name": "tempest-TestServerBasicOps-server-83084592", "status": "BUILD", "tenant_id": "2a822d4c0aca41959976634e55c51931", "user_id": "3e57fb072f774ce0a351fafc32a340fb", "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "hostId": "", "image": {"id": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2"}]}, "flavor": {"id": "3070fbcb-76a6-487a-9634-3b061cf48b92", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92"}]}, "created": "2026-02-27T10:06:48Z", "updated": "2026-02-27T10:06:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "True", "key_name": "tempest-TestServerBasicOps-60721501", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}''' - '2026-02-27 10:06:52,190 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 200 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.056s' - '2026-02-27 10:06:52,190 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:51 GMT'', ''server'': ''Apache'', ''content-length'': ''1555'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-6ac524ec-4d4c-4377-977c-2ce36fa90605'', ''x-compute-request-id'': ''req-6ac524ec-4d4c-4377-977c-2ce36fa90605'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''200'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"server": {"id": "b30c813d-5a37-43fe-b947-3b4677312897", "name": "tempest-TestServerBasicOps-server-83084592", "status": "ERROR", "tenant_id": "2a822d4c0aca41959976634e55c51931", "user_id": "3e57fb072f774ce0a351fafc32a340fb", "metadata": {"meta1": "data1", "meta2": "data2", "metaN": "dataN"}, "hostId": "", "image": {"id": "4d0f893f-8072-4a84-9d4b-3757c7f1f1c2", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/images/4d0f893f-8072-4a84-9d4b-3757c7f1f1c2"}]}, "flavor": {"id": "3070fbcb-76a6-487a-9634-3b061cf48b92", "links": [{"rel": "bookmark", "href": "https://nova-public-openstack.apps-' - ' crc.testing/flavors/3070fbcb-76a6-487a-9634-3b061cf48b92"}]}, "created": "2026-02-27T10:06:48Z", "updated": "2026-02-27T10:06:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897"}, {"rel": "bookmark", "href": "https://nova-public-openstack.apps-crc.testing/servers/b30c813d-5a37-43fe-b947-3b4677312897"}], "OS-DCF:diskConfig": "MANUAL", "fault": {"code": 500, "created": "2026-02-27T10:06:50Z", "message": "No valid host was found. There are not enough hosts available."}, "OS-EXT-AZ:availability_zone": "", "config_drive": "True", "key_name": "tempest-TestServerBasicOps-60721501", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "error", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}''' - 2026-02-27 10:06:52,199 16 INFO [tempest.common.waiters] State transition "BUILD/scheduling" ==> "ERROR/None" after 2 second wait - '2026-02-27 10:06:53,985 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 204 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 1.786s' - '2026-02-27 10:06:53,986 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:52 GMT'', ''server'': ''Apache'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-1119f923-1f00-41b2-9b04-1e1f44c2549f'', ''x-compute-request-id'': ''req-1119f923-1f00-41b2-9b04-1e1f44c2549f'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''''' - '2026-02-27 10:06:54,089 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:test_server_basic_ops): 404 GET https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897 0.103s' - '2026-02-27 10:06:54,090 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:53 GMT'', ''server'': ''Apache'', ''content-length'': ''111'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-3b13b63a-a351-47ca-abc8-aac925ae6a3b'', ''x-compute-request-id'': ''req-3b13b63a-a351-47ca-abc8-aac925ae6a3b'', ''content-type'': ''application/json; charset=UTF-8'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''404'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/servers/b30c813d-5a37-43fe-b947-3b4677312897''}' - ' Body: b''{"itemNotFound": {"code": 404, "message": "Instance b30c813d-5a37-43fe-b947-3b4677312897 could not be found."}}''' - '2026-02-27 10:06:54,261 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794 0.168s' - '2026-02-27 10:06:54,262 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:54 GMT'', ''server'': ''Apache'', ''content-len' - ' gth'': ''0'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-e97a40d7-e0bd-47f7-ab22-66843ac5c096'', ''x-compute-request-id'': ''req-e97a40d7-e0bd-47f7-ab22-66843ac5c096'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-keypair-2079157794''}' - ' Body: b''''' - '2026-02-27 10:06:55,442 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 1.180s' - '2026-02-27 10:06:55,443 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:55 GMT'', ''server'': ''Apache'', ''x-openstack-request-id'': ''req-b10c39cf-8668-4352-b585-4aa7f87cc4eb'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8''}' - ' Body: b''''' - '2026-02-27 10:06:56,104 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 404 GET https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8 0.660s' - '2026-02-27 10:06:56,104 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:56 GMT'', ''server'': ''Apache'', ''content-type'': ''application/json'', ''content-length'': ''146'', ''x-openstack-request-id'': ''req-d569e154-39fe-4873-ac84-7e2b91f621f6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''404'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/384f2878-b9a1-45d0-beeb-7aaf4782d0c8''}' - ' Body: b''{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 384f2878-b9a1-45d0-beeb-7aaf4782d0c8 does not exist", "detail": ""}}''' - '2026-02-27 10:06:57,000 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524 0.895s' - '2026-02-27 10:06:57,001 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:56 GMT'', ''server'': ''Apache'', ''x-openstack-request-id'': ''req-66c92945-9575-4aa5-bd70-9d2f432b5fc6'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/floatingips/16090d1d-102a-4fbe-bde7-07ed95789524''}' - ' Body: b''''' - '2026-02-27 10:06:57,330 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 204 DELETE https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51 0.321s' - '2026-02-27 10:06:57,330 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:57 GMT'', ''server'': ''Apache'', ''x-openstack-requ' - ' est-id'': ''req-0530235f-29f4-4ad4-9297-a9b4213d1992'', ''set-cookie'': ''38cec1d9c789c59243203143f8ef839e=699168c6eee29c7a148807089a682a01; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''204'', ''content-location'': ''https://neutron-public-openstack.apps-crc.testing/v2.0/security-groups/1ce27349-eaf2-421f-9a32-2785f562cc51''}' - ' Body: b''''' - '2026-02-27 10:06:57,469 16 INFO [tempest.lib.common.rest_client] Request (TestServerBasicOps:_run_cleanups): 202 DELETE https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501 0.138s' - '2026-02-27 10:06:57,470 16 DEBUG [tempest.lib.common.rest_client] Request - Headers: {''Content-Type'': ''application/json'', ''Accept'': ''application/json'', ''X-OpenStack-Nova-API-Version'': ''2.1'', ''X-Auth-Token'': ''''}' - ' Body: None' - ' Response - Headers: {''date'': ''Fri, 27 Feb 2026 10:06:57 GMT'', ''server'': ''Apache'', ''content-length'': ''0'', ''openstack-api-version'': ''compute 2.1'', ''x-openstack-nova-api-version'': ''2.1'', ''vary'': ''OpenStack-API-Version,X-OpenStack-Nova-API-Version'', ''x-openstack-request-id'': ''req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1'', ''x-compute-request-id'': ''req-7095fbe9-6d49-4ff3-b8f3-2edfab3db7b1'', ''content-type'': ''application/json'', ''set-cookie'': ''0dc6017b143850df8350099417b4ec9f=de664a8377fc5ce5d365ba4bc42ec7f1; path=/; HttpOnly; Secure; SameSite=None'', ''connection'': ''close'', ''status'': ''202'', ''content-location'': ''https://nova-public-openstack.apps-crc.testing/v2.1/os-keypairs/tempest-TestServerBasicOps-60721501''}' - ' Body: b''''' - '' - '' - '' - ====== - Totals - ====== - 'Ran: 1 tests in 26.5737 sec.' - ' - Passed: 0' - ' - Skipped: 0' - ' - Expected Fail: 0' - ' - Unexpected Success: 0' - ' - Failed: 1' - 'Sum of execute time for each test: 26.5737 sec.' - '' - ============== - Worker Balance - ============== - ' - Worker 0 (1 tests) => 0:00:26.573689' - ~ / - / - Excluded tests - Included tests - ~/openshift / - Generate file containing failing tests - Generate subunit, then xml and html results - tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops[compute,id-7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba,network,smoke] - / 2026-02-27 10:07:15,132 p=39824 u=zuul n=ansible | ...ignoring 2026-02-27 10:07:15,146 p=39824 u=zuul n=ansible | TASK [tempest : Change tempest directory permission back to original path={{ cifmw_tempest_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2026-02-27 10:07:15,146 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:01:30.043) 0:25:08.192 ******* 2026-02-27 10:07:15,146 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:01:30.043) 0:25:08.191 ******* 2026-02-27 10:07:15,451 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:07:15,472 p=39824 u=zuul n=ansible | TASK [tempest : Save logs from podman mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/podman_tempest.log, content="{{ tempest_run_output.stdout }}" ] *** 2026-02-27 10:07:15,473 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:00:00.326) 0:25:08.519 ******* 2026-02-27 10:07:15,473 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:00:00.326) 0:25:08.518 ******* 2026-02-27 10:07:15,950 p=39824 u=zuul n=ansible | changed: [localhost] 2026-02-27 10:07:15,969 p=39824 u=zuul n=ansible | TASK [tempest : Fail if podman container did not succeed that=['tempest_run_output.failed == false']] *** 2026-02-27 10:07:15,969 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:00:00.496) 0:25:09.015 ******* 2026-02-27 10:07:15,969 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:15 +0000 (0:00:00.496) 0:25:09.014 ******* 2026-02-27 10:07:16,006 p=39824 u=zuul n=ansible | fatal: [localhost]: FAILED! => assertion: tempest_run_output.failed == false changed: false evaluated_to: false msg: Assertion failed 2026-02-27 10:07:16,007 p=39824 u=zuul n=ansible | NO MORE HOSTS LEFT ************************************************************* 2026-02-27 10:07:16,008 p=39824 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | localhost : ok=75 changed=40 unreachable=0 failed=1 skipped=16 rescued=0 ignored=1 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:16 +0000 (0:00:00.039) 0:25:09.055 ******* 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | =============================================================================== 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | install_yamls_makes : Run openstack_update_run ----------------------- 1071.03s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------ 111.33s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | tempest : Run tempest -------------------------------------------------- 90.04s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | install_yamls_makes : Run openstack_wait ------------------------------- 78.08s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | Wait for availableVersion to be different from deployedVersion --------- 62.16s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | install_yamls_makes : Run openstack_cleanup ----------------------------- 9.26s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | tempest : Ensure we have tempest container image ------------------------ 9.17s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | update : Initialize monitoring ------------------------------------------ 8.57s 2026-02-27 10:07:16,009 p=39824 u=zuul n=ansible | os_net_setup : Create subnet pools -------------------------------------- 6.36s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup : Delete existing subnet pools ----------------------------- 6.14s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup : Create subnets ------------------------------------------- 5.78s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup : Delete existing subnets ---------------------------------- 5.55s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup : Create networks ------------------------------------------ 4.60s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup : Delete existing networks --------------------------------- 2.90s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | update : Set update step to Starting Update ----------------------------- 2.37s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | tempest : Ensure podman is installed ------------------------------------ 2.36s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | Set update step to CI update sequence complete -------------------------- 2.30s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | Set update step to Verifying update completion -------------------------- 2.27s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | Set update step to Patching OpenStackVersion CR ------------------------- 2.27s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | Set update step to Starting the CI update sequence ---------------------- 2.26s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | Friday 27 February 2026 10:07:16 +0000 (0:00:00.040) 0:25:09.055 ******* 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | =============================================================================== 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | install_yamls_makes -------------------------------------------------- 1271.72s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | tempest --------------------------------------------------------------- 107.95s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | kubernetes.core.k8s_info ----------------------------------------------- 63.06s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | os_net_setup ----------------------------------------------------------- 31.77s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.command ------------------------------------------------ 18.03s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | update ----------------------------------------------------------------- 13.46s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | run_hook ---------------------------------------------------------------- 1.18s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.include_role -------------------------------------------- 0.50s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.37s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.stat ---------------------------------------------------- 0.25s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.shell --------------------------------------------------- 0.24s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.set_fact ------------------------------------------------ 0.24s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.13s 2026-02-27 10:07:16,010 p=39824 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 0.06s 2026-02-27 10:07:16,011 p=39824 u=zuul n=ansible | ansible.builtin.debug --------------------------------------------------- 0.05s 2026-02-27 10:07:16,011 p=39824 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-02-27 10:07:16,011 p=39824 u=zuul n=ansible | total ---------------------------------------------------------------- 1509.01s