~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts error: the server doesn't have a resource type "openstackversion" bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack-kuttl-tests ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/namespace.yaml namespace/openstack-kuttl-tests created timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack-kuttl-tests); do sleep 1; done" NAME DISPLAY NAME STATUS openstack-kuttl-tests Active oc project openstack-kuttl-tests Now using project "openstack-kuttl-tests" on server "https://api.crc.testing:6443". bash scripts/gen-input-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z openstack-kuttl-tests ']' + '[' -z osp-secret ']' + '[' -z 12345678 ']' + '[' -z 1234567842 ']' + '[' -z 767c3ed056cbaa3b9dfedb8c6f825bf0 ']' + '[' -z sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= ']' + '[' -z COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f ']' + '[' -z openstack ']' + '[' -z libvirt-secret ']' + DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input ~/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input ~/src/github.com/openstack-k8s-operators/install_yamls + cat oc get secret/osp-secret || oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/input | oc apply -f - Error from server (NotFound): secrets "osp-secret" not found secret/libvirt-secret created secret/octavia-ca-passphrase created secret/osp-secret created oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/manila/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/manila/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/manila: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/manila/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists manila;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/heat/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/heat/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/heat: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/heat/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/horizon/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/horizon/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/horizon: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/horizon/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nova/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nova/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nova: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nova/cr oc rsh openstack-galera-0 mysql -u root --password=12**********78 -ss -e "show databases like 'nova_%';" | xargs -I '{}' oc rsh openstack-galera-0 mysql -u root --password=12**********78 -ss -e "flush tables; drop database if exists {};" Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra-redis/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra-redis/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra-redis: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra-redis/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/octavia/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/octavia/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/octavia: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/octavia/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists octavia;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/designate/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/designate/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/designate: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/designate/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists designate;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/neutron/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/neutron/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/neutron: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/neutron/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists neutron;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ovn/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ovn/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ovn: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ovn/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ironic/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ironic/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ironic: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/ironic/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists ironic;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists ironic_inspector;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/cinder/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/cinder/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/cinder: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/cinder/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists cinder;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/glance/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/glance/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/glance: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/glance/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists glance;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/placement/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/placement/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/placement: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/placement/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists placement;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/swift/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/swift/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/swift: no such file or directory No resources found rm -Rf -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/swift/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/barbican/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/barbican/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/barbican: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/barbican/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists barbican;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/keystone/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/keystone/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/keystone: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/keystone/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists keystone;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/mariadb/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/mariadb/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/mariadb: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/mariadb/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/telemetry/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/telemetry/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/telemetry: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/telemetry/cr rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/ceilometer-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/telemetry/cr oc rsh -t openstack-galera-0 mysql -u root --password=12**********78 -e "flush tables; drop database if exists aodh;" || true Error from server (NotFound): pods "openstack-galera-0" not found oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr if oc get RabbitmqCluster; then oc delete --ignore-not-found=true RabbitmqCluster --all; fi error: the server doesn't have a resource type "RabbitmqCluster" rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/rabbitmq/cr bash scripts/validate-marketplace.sh + '[' -z 500s ']' + OPERATOR_NAMESPACE=openshift-marketplace ++ oc get pods --no-headers -n openshift-marketplace ++ grep -viE 'running|completed' + not_running_pods= + '[' -z '' ']' + echo 'All openshift-marketplace pods seems to me fine' All openshift-marketplace pods seems to me fine + OPERATORS='openshift-cert-manager-operator kubernetes-nmstate-operator metallb-operator' + for operator in $OPERATORS + n=0 + retries=20 + true + oc get packagemanifests -n openshift-marketplace + grep openshift-cert-manager-operator openshift-cert-manager-operator Red Hat Operators 331d + '[' 0 -eq 0 ']' + break + for operator in $OPERATORS + n=0 + retries=20 + true + oc get packagemanifests -n openshift-marketplace + grep kubernetes-nmstate-operator kubernetes-nmstate-operator Red Hat Operators 331d + '[' 0 -eq 0 ']' + break + for operator in $OPERATORS + n=0 + retries=20 + true + oc get packagemanifests -n openshift-marketplace + grep metallb-operator metallb-operator Red Hat Operators 331d + '[' 0 -eq 0 ']' + break bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openshift-nmstate ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/namespace.yaml namespace/openshift-nmstate created timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openshift-nmstate); do sleep 1; done" NAME DISPLAY NAME STATUS openshift-nmstate Active bash scripts/gen-olm-nmstate.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr + echo OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op + echo DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr + cat + cat + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op operatorgroup.operators.coreos.com/openshift-nmstate-tn6k8 created subscription.operators.coreos.com/kubernetes-nmstate-operator created timeout 500s bash -c "while ! (oc get deployments/nmstate-operator -n openshift-nmstate); do sleep 10; done" Error from server (NotFound): deployments.apps "nmstate-operator" not found NAME READY UP-TO-DATE AVAILABLE AGE nmstate-operator 0/1 1 0 1s oc wait deployments/nmstate-operator -n openshift-nmstate --for condition=Available --timeout=500s deployment.apps/nmstate-operator condition met timeout 500s bash -c "while ! (oc wait pod -n openshift-apiserver -l apiserver=true --for condition=Ready); do sleep 10; done" pod/apiserver-76f77b778f-5fgwp condition met oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr nmstate.nmstate.io/nmstate created timeout 500s bash -c "while ! (oc get pod --no-headers=true -l component=kubernetes-nmstate-handler -n openshift-nmstate| grep nmstate-handler); do sleep 10; done" No resources found in openshift-nmstate namespace. nmstate-handler-tgc5w 0/1 Running 0 10s oc wait pod -n openshift-nmstate -l component=kubernetes-nmstate-handler --for condition=Ready --timeout=500s pod/nmstate-handler-tgc5w condition met timeout 500s bash -c "while ! (oc get deployments/nmstate-webhook -n openshift-nmstate); do sleep 10; done" NAME READY UP-TO-DATE AVAILABLE AGE nmstate-webhook 0/1 1 0 11s oc wait deployments/nmstate-webhook -n openshift-nmstate --for condition=Available --timeout=500s deployment.apps/nmstate-webhook condition met WORKERS='crc' \ bash scripts/gen-nncp.sh + check_var_set DEPLOY_DIR + [[ ! -v DEPLOY_DIR ]] + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr + check_var_set WORKERS + [[ ! -v WORKERS ]] + check_var_set INTERFACE + [[ ! -v INTERFACE ]] + check_var_set BRIDGE_NAME + [[ ! -v BRIDGE_NAME ]] + check_var_set INTERFACE_MTU + [[ ! -v INTERFACE_MTU ]] + check_var_set VLAN_START + [[ ! -v VLAN_START ]] + check_var_set VLAN_STEP + [[ ! -v VLAN_STEP ]] + check_var_set VLAN_STEP + [[ ! -v VLAN_STEP ]] + check_var_set INTERNALAPI_PREFIX + [[ ! -v INTERNALAPI_PREFIX ]] + check_var_set STORAGE_PREFIX + [[ ! -v STORAGE_PREFIX ]] + check_var_set STORAGEMGMT_PREFIX + [[ ! -v STORAGEMGMT_PREFIX ]] + check_var_set TENANT_PREFIX + [[ ! -v TENANT_PREFIX ]] + check_var_set DESIGNATE_PREFIX + [[ ! -v DESIGNATE_PREFIX ]] + check_var_set DESIGNATE_EXT_PREFIX + [[ ! -v DESIGNATE_EXT_PREFIX ]] + '[' -n '' ']' + echo DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr + echo WORKERS crc WORKERS crc + echo INTERFACE ens7 INTERFACE ens7 + echo BRIDGE_NAME ospbr BRIDGE_NAME ospbr + echo INTERFACE_BGP_1 INTERFACE_BGP_1 + echo INTERFACE_BGP_2 INTERFACE_BGP_2 + echo INTERFACE_MTU 1500 INTERFACE_MTU 1500 + echo VLAN_START 20 VLAN_START 20 + echo VLAN_STEP 1 VLAN_STEP 1 + echo STORAGE_MACVLAN STORAGE_MACVLAN + '[' -n true ']' + echo CTLPLANE_IP_ADDRESS_PREFIX 192.168.122 CTLPLANE_IP_ADDRESS_PREFIX 192.168.122 + echo CTLPLANE_IP_ADDRESS_SUFFIX 10 CTLPLANE_IP_ADDRESS_SUFFIX 10 + '[' -n '' ']' + '[' -n '' ']' + IP_ADDRESS_SUFFIX=5 + IPV6_ADDRESS_SUFFIX=5 + rm --force '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr/*_nncp.yaml' + internalapi_vlan_id=20 + storage_vlan_id=21 + tenant_vlan_id=22 + storagemgmt_vlan_id=23 + octavia_vlan_id=24 + designate_vlan_id=25 + designate_ext_vlan_id=26 + for WORKER in ${WORKERS} + cat + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + '[' -n '' ']' + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + '[' -n '' ']' + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + '[' -n '' ']' + cat + IP_ADDRESS_SUFFIX=6 + IPV6_ADDRESS_SUFFIX=6 + CTLPLANE_IP_ADDRESS_SUFFIX=11 + CTLPLANE_IPV6_ADDRESS_SUFFIX=1 oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/nncp/cr/ nodenetworkconfigurationpolicy.nmstate.io/ens7-crc created timeout 240s bash -c "while ! (oc wait nncp -l osp/interface=ens7 --for jsonpath='{.status.conditions[0].reason}'=SuccessfullyConfigured); do sleep 10; done" nodenetworkconfigurationpolicy.nmstate.io/ens7-crc condition met if test -n "192.168.122.10"; then oc patch dns.operator/default --type merge -p '{"spec":{"upstreamResolvers":{"policy":"Sequential","upstreams":[{"type":"Network","address":"'192.168.122.10'","port":53},{"type":"SystemResolvConf"}]}}}'; fi dns.operator.openshift.io/default patched timeout 240s bash -c "while ! (oc wait dns.operator/default --for condition=available); do sleep 10; done" dns.operator.openshift.io/default condition met bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z metallb-system ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/metallb-system + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/metallb-system ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/metallb-system + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/namespace.yaml namespace/metallb-system created timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io metallb-system); do sleep 1; done" NAME DISPLAY NAME STATUS metallb-system Active bash scripts/gen-olm-metallb.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr + echo OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op + echo DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr + echo INTERFACE INTERFACE + cat + cat + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op operatorgroup.operators.coreos.com/metallb-operator created subscription.operators.coreos.com/metallb-operator-sub created timeout 500s bash -c "while ! (oc get pod --no-headers=true -l control-plane=controller-manager -n metallb-system| grep metallb-operator-controller); do sleep 10; done" No resources found in metallb-system namespace. No resources found in metallb-system namespace. metallb-operator-controller-manager-6fd7497c88-v4gzk 0/1 ContainerCreating 0 4s oc wait pod -n metallb-system --for condition=Ready -l control-plane=controller-manager --timeout=500s pod/metallb-operator-controller-manager-6fd7497c88-v4gzk condition met timeout 500s bash -c "while ! (oc get pod --no-headers=true -l component=webhook-server -n metallb-system| grep metallb-operator-webhook); do sleep 10; done" metallb-operator-webhook-server-74877969b9-vf5sw 1/1 Running 0 40s oc wait pod -n metallb-system --for condition=Ready -l component=webhook-server --timeout=500s pod/metallb-operator-webhook-server-74877969b9-vf5sw condition met oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/deploy_operator.yaml metallb.metallb.io/metallb created timeout 500s bash -c "while ! (oc get pod --no-headers=true -l component=speaker -n metallb-system | grep speaker); do sleep 10; done" No resources found in metallb-system namespace. speaker-b2ttl 1/2 Running 0 10s oc wait pod -n metallb-system -l component=speaker --for condition=Ready --timeout=500s pod/speaker-b2ttl condition met make operator_namespace make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' error: the server doesn't have a resource type "openstackversion" bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z cert-manager-operator ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/namespace.yaml namespace/cert-manager-operator created timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io cert-manager-operator); do sleep 1; done" NAME DISPLAY NAME STATUS cert-manager-operator Active oc project cert-manager-operator Now using project "cert-manager-operator" on server "https://api.crc.testing:6443". make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-olm-cert-manager.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op ']' + '[' -z cert-manager-operator ']' + '[' -z stable-v1 ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op + echo OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op + echo OPERATOR_NAMESPACE cert-manager-operator OPERATOR_NAMESPACE cert-manager-operator + echo CHANNEL stable-v1 CHANNEL stable-v1 + cat + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/cert-manager-operator/cert-manager/op operatorgroup.operators.coreos.com/cert-manager-operator-bccwx created subscription.operators.coreos.com/openshift-cert-manager-operator created while ! (oc get pod --no-headers=true -l name=cert-manager-operator -n cert-manager-operator| grep "cert-manager-operator"); do sleep 10; done No resources found in cert-manager-operator namespace. No resources found in cert-manager-operator namespace. cert-manager-operator-controller-manager-64cf6dff88-l9cxs 0/1 ContainerCreating 0 8s oc wait pod -n cert-manager-operator --for condition=Ready -l name=cert-manager-operator --timeout=300s pod/cert-manager-operator-controller-manager-64cf6dff88-l9cxs condition met while ! (oc get pod --no-headers=true -l app=cainjector -n cert-manager | grep "cert-manager-cainjector"); do sleep 10; done No resources found in cert-manager namespace. cert-manager-cainjector-855d9ccff4-v7jrd 0/1 ContainerCreating 0 4s oc wait pod -n cert-manager -l app=cainjector --for condition=Ready --timeout=300s pod/cert-manager-cainjector-855d9ccff4-v7jrd condition met while ! (oc get pod --no-headers=true -l app=webhook -n cert-manager | grep "cert-manager-webhook"); do sleep 10; done cert-manager-webhook-f4fb5df64-z6v29 0/1 Running 0 7s oc wait pod -n cert-manager -l app=webhook --for condition=Ready --timeout=300s pod/cert-manager-webhook-f4fb5df64-z6v29 condition met while ! (oc get pod --no-headers=true -l app=cert-manager -n cert-manager | grep "cert-manager"); do sleep 10; done cert-manager-86cb77c54b-zlqvx 1/1 Running 0 7s oc wait pod -n cert-manager -l app=cert-manager --for condition=Ready --timeout=300s pod/cert-manager-86cb77c54b-zlqvx condition met bash scripts/gen-netatt.sh + check_var_set DEPLOY_DIR + [[ ! -v DEPLOY_DIR ]] + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/netattach/cr ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/netattach/cr + check_var_set INTERFACE + [[ ! -v INTERFACE ]] + check_var_set BRIDGE_NAME + [[ ! -v BRIDGE_NAME ]] + check_var_set VLAN_START + [[ ! -v VLAN_START ]] + check_var_set VLAN_STEP + [[ ! -v VLAN_STEP ]] + '[' -z true ']' + '[' -n true ']' + '[' -n '' ']' + '[' -n true ']' + check_var_set INTERNALAPI_PREFIX + [[ ! -v INTERNALAPI_PREFIX ]] + check_var_set STORAGE_PREFIX + [[ ! -v STORAGE_PREFIX ]] + check_var_set STORAGEMGMT_PREFIX + [[ ! -v STORAGEMGMT_PREFIX ]] + check_var_set TENANT_PREFIX + [[ ! -v TENANT_PREFIX ]] + check_var_set DESIGNATE_PREFIX + [[ ! -v DESIGNATE_PREFIX ]] + check_var_set DESIGNATE_EXT_PREFIX + [[ ! -v DESIGNATE_EXT_PREFIX ]] + echo DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/netattach/cr DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/netattach/cr + echo INTERFACE ens7 INTERFACE ens7 + echo VLAN_START 20 VLAN_START 20 + echo VLAN_STEP 1 VLAN_STEP 1 + '[' -n true ']' + echo CTLPLANE_IP_ADDRESS_PREFIX 192.168.122 CTLPLANE_IP_ADDRESS_PREFIX 192.168.122 + echo CTLPLANE_IP_ADDRESS_SUFFIX 10 CTLPLANE_IP_ADDRESS_SUFFIX 10 + echo 'INTERNALAPI_PREFIX 172.17.0' INTERNALAPI_PREFIX 172.17.0 + echo 'STORAGE_PREFIX 172.18.0' STORAGE_PREFIX 172.18.0 + echo 'STORAGEMGMT_PREFIX 172.20.0' STORAGEMGMT_PREFIX 172.20.0 + echo 'TENANT_PREFIX 172.19.0' TENANT_PREFIX 172.19.0 + echo 'DESIGNATE_PREFIX 172.28.0' DESIGNATE_PREFIX 172.28.0 + echo 'DESIGNATE_PREFIX 172.50.0' DESIGNATE_PREFIX 172.50.0 + '[' -n '' ']' + cat + '[' -n true ']' + cat + cat + cat + '[' -n true ']' + cat + cat + cat + '[' -n true ']' + cat + cat + cat + '[' -n true ']' + cat + cat + cat + cat + '[' -n true ']' + cat + cat + cat + '[' -n true ']' + cat + cat + cat + cat + '[' -n '' ']' + '[' -n '' ']' oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/netattach/cr/ networkattachmentdefinition.k8s.cni.cncf.io/ctlplane created networkattachmentdefinition.k8s.cni.cncf.io/datacentre created networkattachmentdefinition.k8s.cni.cncf.io/designate created networkattachmentdefinition.k8s.cni.cncf.io/designateext created networkattachmentdefinition.k8s.cni.cncf.io/internalapi created networkattachmentdefinition.k8s.cni.cncf.io/octavia created networkattachmentdefinition.k8s.cni.cncf.io/storage created networkattachmentdefinition.k8s.cni.cncf.io/storagemgmt created networkattachmentdefinition.k8s.cni.cncf.io/tenant created oc delete --ignore-not-found=true -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddresspools.yaml error: the path "/home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddresspools.yaml" does not exist make: [Makefile:2556: metallb_config_cleanup] Error 1 (ignored) oc delete --ignore-not-found=true -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2advertisement.yaml error: the path "/home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2advertisement.yaml" does not exist make: [Makefile:2557: metallb_config_cleanup] Error 1 (ignored) oc delete --ignore-not-found=true -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgppeers.yaml error: the path "/home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgppeers.yaml" does not exist make: [Makefile:2558: metallb_config_cleanup] Error 1 (ignored) oc delete --ignore-not-found=true -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpadvertisement.yaml error: the path "/home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpadvertisement.yaml" does not exist make: [Makefile:2559: metallb_config_cleanup] Error 1 (ignored) oc delete --ignore-not-found=true -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpextras.yaml error: the path "/home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpextras.yaml" does not exist make: [Makefile:2560: metallb_config_cleanup] Error 1 (ignored) rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddresspools.yaml /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2advertisement.yaml /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgppeers.yaml /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpadvertisement.yaml /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpextras.yaml bash scripts/gen-metallb-config.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr ']' + '[' -z ens7 ']' + '[' -z ospbr ']' + '[' -z 64999 ']' + '[' -z 64999 ']' + '[' -z 100.65.4.1 ']' + '[' -z 100.64.4.1 ']' + '[' -z 172.30.4.2 ']' + '[' -z true ']' + echo DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr DEPLOY_DIR /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr + echo INTERFACE ens7 INTERFACE ens7 + echo CTLPLANE_METALLB_POOL 192.168.122.80-192.168.122.90 CTLPLANE_METALLB_POOL 192.168.122.80-192.168.122.90 + echo CTLPLANE_METALLB_IPV6_POOL fd00:aaaa::80-fd00:aaaa::90 CTLPLANE_METALLB_IPV6_POOL fd00:aaaa::80-fd00:aaaa::90 + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + '[' -n true ']' + cat + '[' -n '' ']' + cat + cat + cat + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddresspools.yaml ipaddresspool.metallb.io/ctlplane created ipaddresspool.metallb.io/internalapi created ipaddresspool.metallb.io/storage created ipaddresspool.metallb.io/tenant created ipaddresspool.metallb.io/designateext created oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2advertisement.yaml l2advertisement.metallb.io/ctlplane created l2advertisement.metallb.io/internalapi created l2advertisement.metallb.io/storage created l2advertisement.metallb.io/tenant created l2advertisement.metallb.io/designateext created bash scripts/gen-olm.sh + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' -z quay.io/openstack-k8s-operators/openstack-operator-index:latest ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op + OPERATOR_CHANNEL=alpha + OPERATOR_SOURCE=openstack-operator-index + OPERATOR_SOURCE_NAMESPACE=openstack-operators + echo OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op OPERATOR_DIR /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op + echo OPERATOR_CHANNEL alpha OPERATOR_CHANNEL alpha + echo OPERATOR_SOURCE openstack-operator-index OPERATOR_SOURCE openstack-operator-index + echo OPERATOR_SOURCE_NAMESPACE openstack-operators OPERATOR_SOURCE_NAMESPACE openstack-operators + cat + cat + cat bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack-operators ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack-operators + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/namespace.yaml Warning: resource namespaces/openstack-operators is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. namespace/openstack-operators configured timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack-operators); do sleep 1; done" NAME DISPLAY NAME STATUS openstack-operators Active oc project openstack-operators Now using project "openstack-operators" on server "https://api.crc.testing:6443". oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op catalogsource.operators.coreos.com/openstack-operator-index created operatorgroup.operators.coreos.com/openstack created subscription.operators.coreos.com/openstack-operator created oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr | oc delete --ignore-not-found=true -f - || true error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr bash -c "test -d /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator || CHECKOUT_FROM_OPENSTACK_REF=false scripts/clone-operator-repo.sh" Cloning repo: git clone -b main https://github.com/openstack-k8s-operators/openstack-operator.git openstack-operator Cloning into 'openstack-operator'... cp /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr bash scripts/gen-service-kustomize.sh +++ dirname scripts/gen-service-kustomize.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only ++ set -e + '[' -z openstack-kuttl-tests ']' + '[' -z OpenStackControlPlane ']' + '[' -z osp-secret ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr ']' + '[' -n '' ']' + REPLACEMENTS= + IMAGE=unused + IMAGE_PATH=containerImage + STORAGE_REQUEST=10G + INTERFACE_MTU=1500 + VLAN_START=20 + VLAN_STEP=1 + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr ~/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr ~/src/github.com/openstack-k8s-operators/install_yamls + cat + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ '' != '' ]] + IFS=, + read -ra IMAGES + IFS=, + read -ra IMAGE_PATHS + '[' 1 '!=' 1 ']' + (( i=0 )) + (( i < 1 )) + SPEC_PATH=containerImage + SPEC_VALUE=unused + '[' unused '!=' unused ']' + (( i++ )) + (( i < 1 )) + '[' -n '' ']' + '[' OpenStackControlPlane == OpenStackControlPlane ']' + cat + '[' OpenStackControlPlane == Galera ']' + '[' OpenStackControlPlane == NetConfig ']' + '[' -n '' ']' + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ true == \t\r\u\e ]] + cat + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + '[' -z true ']' + cat + '[' -n '' ']' + '[' -z true ']' + '[' -n true ']' + '[' -n '' ']' + '[' -n '' ']' + kustomization_add_resources + echo merge config dir merge config dir ++ find . -type f -name '*.yaml' ++ grep -v kustomization + yamls=./core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml + for y in ${yamls[@]} + kustomize edit add resource ./core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml + popd ~/src/github.com/openstack-k8s-operators/install_yamls # Wait until OLM installs openstack CRDs timeout 500s bash -c "while ! (oc get crd openstacks.operator.openstack.org); do sleep 1; done" Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "openstacks.operator.openstack.org" not found NAME CREATED AT openstacks.operator.openstack.org 2026-01-20T22:50:39Z make openstack_init make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' error: the server doesn't have a resource type "openstackversion" # call make_openstack if it isn't already bash -c '(oc get subscription -n openstack-operators openstack-operator || make openstack) || true' NAME PACKAGE SOURCE CHANNEL openstack-operator openstack-operator openstack-operator-index alpha timeout 500s bash -c 'until $(oc get csv -l operators.coreos.com/openstack-operator.openstack-operators -n openstack-operators | grep -q Succeeded); do sleep 1; done' No resources found in openstack-operators namespace. bash -c 'test -f /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/operator_v1beta1_openstack.yaml || make openstack_repo' oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/operator_v1beta1_openstack.yaml openstack.operator.openstack.org/openstack created # FIXME: Ugly hack to prevent OpenStack Baremetal operator from crashing when BMO is not installed if ! echo "" | grep -q "baremetalhosts.metal3.io"; then \ curl -o /tmp/bmh_crd.yaml --retry-all-errors --retry 5 --retry-delay 10 https://raw.githubusercontent.com/metal3-io/baremetal-operator/refs/heads/main/config/base/crds/bases/metal3.io_baremetalhosts.yaml; \ oc apply -f /tmp/bmh_crd.yaml; \ rm -f /tmp/bmh_crd.yaml; \ fi % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 62515 100 62515 0 0 924k 0 --:--:-- --:--:-- --:--:-- 924k customresourcedefinition.apiextensions.k8s.io/baremetalhosts.metal3.io created oc wait openstack/openstack -n openstack-operators --for condition=Ready --timeout=500s openstack.operator.openstack.org/openstack condition met timeout 500s bash -c "while ! (oc get services -n openstack-operators | grep -E '^(openstack|openstack-baremetal|infra)-operator-webhook-service' | wc -l | grep -q -e 3); do sleep 5; done" make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq-cluster ']' + DEPL_NAME=openstack-operator-controller-manager ++ oc get -n openstack-operators deployment openstack-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq-cluster ']' + DEPL_NAME=openstack-operator-controller-manager ++ oc get -n openstack-operators deployment openstack-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq-cluster ']' + DEPL_NAME=openstack-operator-controller-manager ++ oc get -n openstack-operators deployment openstack-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z openstack ']' + '[' openstack = rabbitmq-cluster ']' + DEPL_NAME=openstack-operator-controller-manager ++ oc get -n openstack-operators deployment openstack-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make openstack_kuttl_run make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' set -e; \ for test_dir in ctlplane-basic-deployment ctlplane-basic-deployment-with-nicMappings ctlplane-collapsed ctlplane-galera-3replicas ctlplane-nodeselectors ctlplane-tls-cert-rotation ctlplane-tls-custom-issuers ctlplane-tls-custom-route dataplane-create-test dataplane-deploy-global-service-test dataplane-deploy-multiple-secrets dataplane-deploy-no-nodes-test dataplane-deploy-tls-test dataplane-extramounts dataplane-multinode-nodeset-create-test dataplane-service-config dataplane-service-custom-image dataplane-service-failure; do \ oc delete osctlplane --all --namespace openstack-kuttl-tests; \ make crc_storage_cleanup_with_retries; \ make crc_storage_with_retries; \ kubectl-kuttl test --config /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests --test ${test_dir}; \ done No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/crc-storage + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage created timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Now using project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound No resources found ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' No resources found if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 5m7s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage created ++ cat ++ oc apply -f - serviceaccount/crc-storage created ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role created ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding created + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/crc + PV_NUM=20 + STORAGE_CAPACITY=10 ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' ++ oc get node -o name -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created Warning: resource persistentvolumes/local-storage01-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage01-crc configured Warning: resource persistentvolumes/local-storage02-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage02-crc configured Warning: resource persistentvolumes/local-storage03-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage03-crc configured Warning: resource persistentvolumes/local-storage04-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage04-crc configured Warning: resource persistentvolumes/local-storage05-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage05-crc configured Warning: resource persistentvolumes/local-storage06-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage06-crc configured Warning: resource persistentvolumes/local-storage07-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage07-crc configured Warning: resource persistentvolumes/local-storage08-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage08-crc configured Warning: resource persistentvolumes/local-storage09-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage09-crc configured Warning: resource persistentvolumes/local-storage10-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage10-crc configured Warning: resource persistentvolumes/local-storage11-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage11-crc configured Warning: resource persistentvolumes/local-storage12-crc is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. persistentvolume/local-storage12-crc configured persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs created make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 22:52:30 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 22:52:30 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 22:52:31 | | netconfig.network.openstack.org/netconfig created logger.go:42: 22:52:31 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 22:52:31 | | dnsmasq.network.openstack.org/dnsmasq created logger.go:42: 22:52:31 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 22:52:31 | | Generating public/private rsa key pair. logger.go:42: 22:52:31 | | Your identification has been saved in ansibleee-ssh-key-id_rsa logger.go:42: 22:52:31 | | Your public key has been saved in ansibleee-ssh-key-id_rsa.pub logger.go:42: 22:52:31 | | The key fingerprint is: logger.go:42: 22:52:31 | | SHA256:FyBU3/1n78AGyGmXrR5wbncd1DTGWr9MUI8TvLGF9i0 zuul@controller logger.go:42: 22:52:31 | | The key's randomart image is: logger.go:42: 22:52:31 | | +---[RSA 4096]----+ logger.go:42: 22:52:31 | | | .o.o .+=.| logger.go:42: 22:52:31 | | | . o . o**=| logger.go:42: 22:52:31 | | | o ..BB=| logger.go:42: 22:52:31 | | | . + +E++| logger.go:42: 22:52:31 | | | S B = +o=| logger.go:42: 22:52:31 | | | o = + +=| logger.go:42: 22:52:31 | | | = = +| logger.go:42: 22:52:31 | | | o + + | logger.go:42: 22:52:31 | | | . .| logger.go:42: 22:52:31 | | +----[SHA256]-----+ logger.go:42: 22:52:31 | | secret/dataplane-ansible-ssh-private-key-secret created harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-basic-deployment === PAUSE kuttl/harness/ctlplane-basic-deployment === RUN kuttl/harness/ctlplane-basic-deployment-with-nicMappings === PAUSE kuttl/harness/ctlplane-basic-deployment-with-nicMappings === CONT kuttl/harness/ctlplane-basic-deployment logger.go:42: 22:52:31 | ctlplane-basic-deployment | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 22:52:31 | ctlplane-basic-deployment/1-deploy-openstack | starting test step 1-deploy-openstack logger.go:42: 22:52:31 | ctlplane-basic-deployment/1-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 22:52:32 | ctlplane-basic-deployment/1-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 22:52:32 | ctlplane-basic-deployment/1-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 22:52:32 | ctlplane-basic-deployment/1-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 22:57:31 | ctlplane-basic-deployment/1-deploy-openstack | test step completed 1-deploy-openstack logger.go:42: 22:57:31 | ctlplane-basic-deployment/2-deploy-custom-cacert-secret | starting test step 2-deploy-custom-cacert-secret logger.go:42: 22:57:31 | ctlplane-basic-deployment/2-deploy-custom-cacert-secret | running command: [sh -c oc apply -n $NAMESPACE -f ../../common/custom-ca.yaml ] logger.go:42: 22:57:31 | ctlplane-basic-deployment/2-deploy-custom-cacert-secret | secret/ca-custom-kuttl created logger.go:42: 22:57:31 | ctlplane-basic-deployment/2-deploy-custom-cacert-secret | test step completed 2-deploy-custom-cacert-secret logger.go:42: 22:57:31 | ctlplane-basic-deployment/3-deploy-custom-cacert | starting test step 3-deploy-custom-cacert logger.go:42: 22:57:31 | ctlplane-basic-deployment/3-deploy-custom-cacert | running command: [sh -c oc kustomize ../../../../config/samples/tls/custom_ca | oc apply -n $NAMESPACE -f - ] logger.go:42: 22:57:35 | ctlplane-basic-deployment/3-deploy-custom-cacert | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 22:57:35 | ctlplane-basic-deployment/3-deploy-custom-cacert | test step completed 3-deploy-custom-cacert logger.go:42: 22:57:35 | ctlplane-basic-deployment/4- | starting test step 4- logger.go:42: 22:57:35 | ctlplane-basic-deployment/4- | running command: [sh -c echo "Checking ca-custom-kuttl.pem is present in combined-ca-bundle..." CUSTOM_CERT_CONTENT=$(oc get secret ca-custom-kuttl -n $NAMESPACE -o jsonpath="{.data['ca-custom-kuttl\.pem']}" | base64 --decode | tr -d '\n') TLS_BUNDLE_CONTENT=$(oc get secret combined-ca-bundle -n $NAMESPACE -o jsonpath="{.data['tls-ca-bundle\.pem']}" | base64 --decode | tr -d '\n') if [[ "$TLS_BUNDLE_CONTENT" == *"$CUSTOM_CERT_CONTENT"* ]]; then echo "OK" exit 0 else echo "Not present" exit 1 fi ] logger.go:42: 22:57:35 | ctlplane-basic-deployment/4- | Checking ca-custom-kuttl.pem is present in combined-ca-bundle... logger.go:42: 22:57:35 | ctlplane-basic-deployment/4- | OK logger.go:42: 22:57:35 | ctlplane-basic-deployment/4- | test step completed 4- logger.go:42: 22:57:35 | ctlplane-basic-deployment/5-cleanup | starting test step 5-cleanup logger.go:42: 22:57:37 | ctlplane-basic-deployment/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 22:57:37 | ctlplane-basic-deployment/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 22:57:37 | ctlplane-basic-deployment/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 22:57:37 | ctlplane-basic-deployment/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 22:57:37 | ctlplane-basic-deployment/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 22:57:38 | ctlplane-basic-deployment/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 22:57:44 | ctlplane-basic-deployment/5-cleanup | secret "rootca-internal" deleted logger.go:42: 22:57:44 | ctlplane-basic-deployment/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 22:57:44 | ctlplane-basic-deployment/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 22:57:44 | ctlplane-basic-deployment/5-cleanup | secret "rootca-public" deleted logger.go:42: 22:58:16 | ctlplane-basic-deployment/5-cleanup | test step completed 5-cleanup logger.go:42: 22:58:16 | ctlplane-basic-deployment | skipping kubernetes event logging === CONT kuttl/harness/ctlplane-basic-deployment-with-nicMappings logger.go:42: 22:58:16 | ctlplane-basic-deployment-with-nicMappings | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 22:58:16 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | starting test step 1-create-nic-mappings logger.go:42: 22:58:16 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | running command: [sh -c oc apply -n $NAMESPACE -f ../../../../config/samples/nad_datacentre.yaml ] logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | networkattachmentdefinition.k8s.cni.cncf.io/datacentre configured logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | test step completed 1-create-nic-mappings logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | starting test step 2-deploy-openstack logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 22:58:17 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:01:55 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | test step completed 2-deploy-openstack logger.go:42: 23:01:55 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | starting test step 3-add-ovn-nic-mappings logger.go:42: 23:01:55 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | running command: [sh -c oc patch openstackcontrolplane -n $NAMESPACE openstack --type='json' -p='[{ "op": "replace", "path": "/spec/ovn/template/ovnController/nicMappings", "value":{"datacentre":"ospbr"} }]' ] logger.go:42: 23:01:55 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | openstackcontrolplane.core.openstack.org/openstack patched logger.go:42: 23:02:02 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | test step completed 3-add-ovn-nic-mappings logger.go:42: 23:02:02 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | starting test step 4-remove-ovn-nic-mappings logger.go:42: 23:02:02 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c oc patch OpenStackControlPlane -n $NAMESPACE openstack --type='json' -p='[{ "op": "remove", "path": "/spec/ovn/template/ovnController/nicMappings", }]' ] logger.go:42: 23:02:02 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | openstackcontrolplane.core.openstack.org/openstack patched logger.go:42: 23:02:02 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:03 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:04 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:06 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:07 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:09 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:10 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:11 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:13 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:14 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:15 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:17 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:18 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:20 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:21 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:22 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:24 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:25 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:26 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:28 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:29 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:30 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:32 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:33 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:34 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:36 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:02:36 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | test step completed 4-remove-ovn-nic-mappings logger.go:42: 23:02:36 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | starting test step 5-cleanup logger.go:42: 23:02:36 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovncontroller-ovndbs" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:02:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:02:38 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:02:38 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:02:38 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:02:38 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:02:38 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:02:44 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:02:44 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:02:44 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:02:44 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:03:10 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | test step completed 5-cleanup logger.go:42: 23:03:10 | ctlplane-basic-deployment-with-nicMappings | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (639.70s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-basic-deployment (344.55s) --- PASS: kuttl/harness/ctlplane-basic-deployment-with-nicMappings (294.04s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 10m storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:03:34 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:03:34 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:03:34 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:03:34 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:03:35 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:03:35 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:03:35 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-basic-deployment-with-nicMappings === PAUSE kuttl/harness/ctlplane-basic-deployment-with-nicMappings === CONT kuttl/harness/ctlplane-basic-deployment-with-nicMappings logger.go:42: 23:03:35 | ctlplane-basic-deployment-with-nicMappings | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:03:35 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | starting test step 1-create-nic-mappings logger.go:42: 23:03:35 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | running command: [sh -c oc apply -n $NAMESPACE -f ../../../../config/samples/nad_datacentre.yaml ] logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | networkattachmentdefinition.k8s.cni.cncf.io/datacentre unchanged logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/1-create-nic-mappings | test step completed 1-create-nic-mappings logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | starting test step 2-deploy-openstack logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:03:36 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:07:51 | ctlplane-basic-deployment-with-nicMappings/2-deploy-openstack | test step completed 2-deploy-openstack logger.go:42: 23:07:51 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | starting test step 3-add-ovn-nic-mappings logger.go:42: 23:07:51 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | running command: [sh -c oc patch openstackcontrolplane -n $NAMESPACE openstack --type='json' -p='[{ "op": "replace", "path": "/spec/ovn/template/ovnController/nicMappings", "value":{"datacentre":"ospbr"} }]' ] logger.go:42: 23:07:52 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | openstackcontrolplane.core.openstack.org/openstack patched logger.go:42: 23:07:57 | ctlplane-basic-deployment-with-nicMappings/3-add-ovn-nic-mappings | test step completed 3-add-ovn-nic-mappings logger.go:42: 23:07:57 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | starting test step 4-remove-ovn-nic-mappings logger.go:42: 23:07:57 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c oc patch OpenStackControlPlane -n $NAMESPACE openstack --type='json' -p='[{ "op": "remove", "path": "/spec/ovn/template/ovnController/nicMappings", }]' ] logger.go:42: 23:07:57 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | openstackcontrolplane.core.openstack.org/openstack patched logger.go:42: 23:07:57 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:07:58 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:08:00 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:08:01 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:08:02 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | running command: [sh -c ovs_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller-ovs --no-headers=true --ignore-not-found=true | wc -l) ovn_controller_pod_count=$(oc get pod -n $NAMESPACE -l service=ovn-controller --no-headers=true --ignore-not-found=true | wc -l) if [ $ovs_controller_pod_count -eq 0 ] && [ $ovn_controller_pod_count -eq 0 ]; then exit 0 fi exit 1 ] logger.go:42: 23:08:03 | ctlplane-basic-deployment-with-nicMappings/4-remove-ovn-nic-mappings | test step completed 4-remove-ovn-nic-mappings logger.go:42: 23:08:03 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | starting test step 5-cleanup logger.go:42: 23:08:03 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:08:03 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovncontroller-ovndbs" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:08:04 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:08:05 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:08:11 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:08:11 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:08:11 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:08:11 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:08:37 | ctlplane-basic-deployment-with-nicMappings/5-cleanup | test step completed 5-cleanup logger.go:42: 23:08:37 | ctlplane-basic-deployment-with-nicMappings | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (302.89s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-basic-deployment-with-nicMappings (301.33s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 5m12s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ oc apply -f - ++ cat Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:09:01 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:09:01 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:09:02 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:09:02 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:09:02 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:09:02 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:09:02 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-collapsed === PAUSE kuttl/harness/ctlplane-collapsed === CONT kuttl/harness/ctlplane-collapsed logger.go:42: 23:09:02 | ctlplane-collapsed | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:09:02 | ctlplane-collapsed/0-deps | starting test step 0-deps logger.go:42: 23:09:02 | ctlplane-collapsed/0-deps | running command: [sh -c oc apply -f ../../common/rhobs.yaml until oc api-resources | grep -q rhobs; do sleep 1; done ] logger.go:42: 23:09:03 | ctlplane-collapsed/0-deps | subscription.operators.coreos.com/cluster-observability-operator created logger.go:42: 23:09:15 | ctlplane-collapsed/0-deps | test step completed 0-deps logger.go:42: 23:09:15 | ctlplane-collapsed/1-deploy-openstack-collapsed-cell | starting test step 1-deploy-openstack-collapsed-cell logger.go:42: 23:09:15 | ctlplane-collapsed/1-deploy-openstack-collapsed-cell | running command: [sh -c oc apply -n $NAMESPACE -f ../../../../config/samples/core_v1beta1_openstackcontrolplane_collapsed_cell.yaml ] logger.go:42: 23:09:15 | ctlplane-collapsed/1-deploy-openstack-collapsed-cell | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:09:15 | ctlplane-collapsed/1-deploy-openstack-collapsed-cell | openstackcontrolplane.core.openstack.org/openstack-collapsed-cell created logger.go:42: 23:13:49 | ctlplane-collapsed/1-deploy-openstack-collapsed-cell | test step completed 1-deploy-openstack-collapsed-cell logger.go:42: 23:13:49 | ctlplane-collapsed/2-cleanup | starting test step 2-cleanup logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | running command: [sh -c oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-metric-storage-prometheus-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:13:50 | ctlplane-collapsed/2-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-watcher-internal-svc" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-watcher-public-route" deleted logger.go:42: 23:13:51 | ctlplane-collapsed/2-cleanup | secret "cert-watcher-public-svc" deleted logger.go:42: 23:13:57 | ctlplane-collapsed/2-cleanup | secret "rootca-internal" deleted logger.go:42: 23:13:57 | ctlplane-collapsed/2-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:13:57 | ctlplane-collapsed/2-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:13:57 | ctlplane-collapsed/2-cleanup | secret "rootca-public" deleted logger.go:42: 23:14:24 | ctlplane-collapsed/2-cleanup | test step completed 2-cleanup logger.go:42: 23:14:24 | ctlplane-collapsed | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (323.32s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-collapsed (321.75s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/swift-swift-storage-0 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/prometheus-metric-storage-db-prometheus-metric-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/prometheus-metric-storage-db-prometheus-metric-storage-0 ++ cut -d / -f 2 + NAME=prometheus-metric-storage-db-prometheus-metric-storage-0 + oc delete -n openstack-kuttl-tests pvc/prometheus-metric-storage-db-prometheus-metric-storage-0 --ignore-not-found persistentvolumeclaim "prometheus-metric-storage-db-prometheus-metric-storage-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 5m33s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ oc apply -f - ++ cat rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:14:49 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:14:49 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:14:53 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:14:53 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:14:54 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:14:54 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:14:54 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-galera-3replicas === PAUSE kuttl/harness/ctlplane-galera-3replicas === CONT kuttl/harness/ctlplane-galera-3replicas logger.go:42: 23:14:54 | ctlplane-galera-3replicas | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:14:54 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | starting test step 1-deploy-galera-3replicas logger.go:42: 23:14:54 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | running command: [sh -c oc apply -n $NAMESPACE -f ../../../../config/samples/core_v1beta1_openstackcontrolplane_galera_3replicas.yaml ] logger.go:42: 23:14:54 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:14:54 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:14:54 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | openstackcontrolplane.core.openstack.org/openstack-galera-3replicas created logger.go:42: 23:19:21 | ctlplane-galera-3replicas/1-deploy-galera-3replicas | test step completed 1-deploy-galera-3replicas logger.go:42: 23:19:21 | ctlplane-galera-3replicas/2-cleanup | starting test step 2-cleanup logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ mysql-db-openstack-galera-0 \ mysql-db-openstack-galera-1 \ mysql-db-openstack-galera-2 \ mysql-db-openstack-cell1-galera-0 \ mysql-db-openstack-cell1-galera-1 \ mysql-db-openstack-cell1-galera-2 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-galera-0" deleted logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-galera-1" deleted logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-galera-2" deleted logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-cell1-galera-1" deleted logger.go:42: 23:19:22 | ctlplane-galera-3replicas/2-cleanup | persistentvolumeclaim "mysql-db-openstack-cell1-galera-2" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:19:34 | ctlplane-galera-3replicas/2-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:19:35 | ctlplane-galera-3replicas/2-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:19:41 | ctlplane-galera-3replicas/2-cleanup | secret "rootca-internal" deleted logger.go:42: 23:19:41 | ctlplane-galera-3replicas/2-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:19:41 | ctlplane-galera-3replicas/2-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:19:41 | ctlplane-galera-3replicas/2-cleanup | secret "rootca-public" deleted logger.go:42: 23:19:56 | ctlplane-galera-3replicas/2-cleanup | test step completed 2-cleanup logger.go:42: 23:19:56 | ctlplane-galera-3replicas | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (307.37s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-galera-3replicas (302.00s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 5m17s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ oc apply -f - ++ cat role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ tr '\n' ' ' ++ head -c-1 ++ sed -e 's|node/||' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:20:20 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:20:20 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:20:21 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:20:21 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:20:21 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:20:21 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:20:22 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-nodeselectors === PAUSE kuttl/harness/ctlplane-nodeselectors === CONT kuttl/harness/ctlplane-nodeselectors logger.go:42: 23:20:22 | ctlplane-nodeselectors | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | starting test step 1-deploy-openstack logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | running command: [sh -c oc annotate namespace $NAMESPACE openshift.io/node-selector="beta.kubernetes.io/os=linux" ] logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | namespace/openstack-kuttl-tests annotated logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/nodeselectors/global | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:20:22 | ctlplane-nodeselectors/1-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:25:01 | ctlplane-nodeselectors/1-deploy-openstack | test step completed 1-deploy-openstack logger.go:42: 23:25:01 | ctlplane-nodeselectors/2- | starting test step 2- logger.go:42: 23:25:01 | ctlplane-nodeselectors/2- | running command: [sh -c echo "Checking all pods have expected nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:01 | ctlplane-nodeselectors/2- | Checking all pods have expected nodeselector logger.go:42: 23:25:02 | ctlplane-nodeselectors/2- | running command: [sh -c echo "Checking all cronjobs have expected nodeselector" EXPECTED_NODE_SELECTOR="node-role.kubernetes.io/worker:" BAD_OR_MISSING_NODE_SELECTOR=$(oc get cronjobs -n $NAMESPACE -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.jobTemplate.spec.template.spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT cronjobs with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:02 | ctlplane-nodeselectors/2- | Checking all cronjobs have expected nodeselector logger.go:42: 23:25:02 | ctlplane-nodeselectors/2- | test step completed 2- logger.go:42: 23:25:02 | ctlplane-nodeselectors/3-update-nodeselector | starting test step 3-update-nodeselector logger.go:42: 23:25:02 | ctlplane-nodeselectors/3-update-nodeselector | running command: [sh -c oc patch openstackcontrolplane -n $NAMESPACE openstack --type='json' -p='[{ "op": "replace", "path": "/spec/nodeSelector", "value": {"kubernetes.io/os":"linux"} }]' ] logger.go:42: 23:25:02 | ctlplane-nodeselectors/3-update-nodeselector | openstackcontrolplane.core.openstack.org/openstack patched logger.go:42: 23:25:02 | ctlplane-nodeselectors/3-update-nodeselector | test step completed 3-update-nodeselector logger.go:42: 23:25:02 | ctlplane-nodeselectors/4- | starting test step 4- logger.go:42: 23:25:02 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:02 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | Found 28 pods with bad or missing nodeselector: logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | ceilometer-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | kube-state-metrics-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | memcached-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-cell1-novncproxy-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | openstack-cell1-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | openstack-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | ovsdbserver-nb-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | ovsdbserver-sb-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:03 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | Found 28 pods with bad or missing nodeselector: logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | ceilometer-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | kube-state-metrics-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | memcached-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-cell1-novncproxy-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | openstack-cell1-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | openstack-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | ovsdbserver-nb-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | ovsdbserver-sb-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:04 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | Found 26 pods with bad or missing nodeselector: logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | ceilometer-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | kube-state-metrics-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | memcached-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-cell1-novncproxy-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | openstack-cell1-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | openstack-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:05 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | Found 22 pods with bad or missing nodeselector: logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | ceilometer-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | openstack-galera-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:06 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:07 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:07 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | Found 21 pods with bad or missing nodeselector: logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | ceilometer-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:08 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | Found 20 pods with bad or missing nodeselector: logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:09 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | Found 20 pods with bad or missing nodeselector: logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:10 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:11 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:11 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | Found 20 pods with bad or missing nodeselector: logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | ovn-northd-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:12 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | Found 19 pods with bad or missing nodeselector: logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:13 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | Found 19 pods with bad or missing nodeselector: logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | rabbitmq-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:14 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:15 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:15 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | Found 18 pods with bad or missing nodeselector: logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | rabbitmq-cell1-server-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:16 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:17 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:18 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:19 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:19 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:20 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:21 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:22 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:23 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:23 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:24 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:25 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:26 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:27 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:27 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | Found 17 pods with bad or missing nodeselector: logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | cinder-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:28 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | Found 16 pods with bad or missing nodeselector: logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:29 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | Found 16 pods with bad or missing nodeselector: logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | nova-cell0-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | nova-cell1-conductor-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:30 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:31 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:31 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | Found 14 pods with bad or missing nodeselector: logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:32 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | Found 14 pods with bad or missing nodeselector: logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:33 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | Found 14 pods with bad or missing nodeselector: logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | swift-storage-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:34 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:35 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:35 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | Found 13 pods with bad or missing nodeselector: logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:36 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | Found 13 pods with bad or missing nodeselector: logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | barbican-keystone-listener-7587c489b5-vzmf2: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | barbican-worker-77849f758-fppxg: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:37 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | Found 11 pods with bad or missing nodeselector: logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | glance-default-external-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | glance-default-internal-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:38 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:39 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:39 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:40 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:41 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:42 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:43 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:44 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:44 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:45 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:46 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:47 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:48 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:48 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | Found 9 pods with bad or missing nodeselector: logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | barbican-api-6687fdd977-92b7s: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:49 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:50 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:51 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:52 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:52 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:53 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:54 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:55 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:55 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:56 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:57 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:25:58 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:25:59 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:25:59 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:00 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:01 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:02 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:03 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:03 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:04 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | Found 8 pods with bad or missing nodeselector: logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | placement-7597899ccc-qc79q: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:05 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | Found 7 pods with bad or missing nodeselector: logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:06 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:07 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:07 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | Found 7 pods with bad or missing nodeselector: logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | neutron-6f7b76b9f9-kb5m8: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | nova-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:08 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | Found 5 pods with bad or missing nodeselector: logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:09 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | Found 5 pods with bad or missing nodeselector: logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | nova-api-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | nova-metadata-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:10 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:11 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:11 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | Found 3 pods with bad or missing nodeselector: logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:12 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | Found 3 pods with bad or missing nodeselector: logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | cinder-scheduler-0: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | keystone-5c77db7594-ssxbs: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | openstackclient: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | swift-proxy-55d95d9dc5-4zf8z: map[beta.kubernetes.io/os:linux node-role.kubernetes.io/worker:] logger.go:42: 23:26:13 | ctlplane-nodeselectors/4- | command failure, skipping 1 additional commands logger.go:42: 23:26:14 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all running pods have new nodeselector" EXPECTED_NODE_SELECTOR="beta.kubernetes.io/os:linux kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get pods -n $NAMESPACE -l service!=dnsmasq --field-selector=status.phase=Running -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT pods with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:14 | ctlplane-nodeselectors/4- | Checking all running pods have new nodeselector logger.go:42: 23:26:14 | ctlplane-nodeselectors/4- | running command: [sh -c echo "Checking all cronjobs have expected nodeselector" EXPECTED_NODE_SELECTOR="kubernetes.io/os:linux" BAD_OR_MISSING_NODE_SELECTOR=$(oc get cronjobs -n $NAMESPACE -o=go-template --template='{{ range .items }}{{ .metadata.name}}: {{ .spec.jobTemplate.spec.template.spec.nodeSelector }}{{"\n"}}{{ end }}' | grep -v 'ovn-controller-.*-config' | grep -v 'crc-storage-*' | sed -e '\!map\['"$EXPECTED_NODE_SELECTOR"'\]$!d') BAD_OR_MISSING_NODE_SELECTOR_COUNT=$(echo -n "$BAD_OR_MISSING_NODE_SELECTOR" | wc -l) if [ $BAD_OR_MISSING_NODE_SELECTOR_COUNT -ne 0 ]; then echo "Found $BAD_OR_MISSING_NODE_SELECTOR_COUNT cronjobs with bad or missing nodeselector:" echo "$BAD_OR_MISSING_NODE_SELECTOR" exit 1 fi ] logger.go:42: 23:26:14 | ctlplane-nodeselectors/4- | Checking all cronjobs have expected nodeselector logger.go:42: 23:26:14 | ctlplane-nodeselectors/4- | test step completed 4- logger.go:42: 23:26:14 | ctlplane-nodeselectors/5-cleanup | starting test step 5-cleanup logger.go:42: 23:26:15 | ctlplane-nodeselectors/5-cleanup | running command: [sh -c oc annotate namespace $NAMESPACE openshift.io/node-selector- oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:26:15 | ctlplane-nodeselectors/5-cleanup | namespace/openstack-kuttl-tests annotated logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:26:16 | ctlplane-nodeselectors/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:26:22 | ctlplane-nodeselectors/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:26:22 | ctlplane-nodeselectors/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:26:22 | ctlplane-nodeselectors/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:26:22 | ctlplane-nodeselectors/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:26:50 | ctlplane-nodeselectors/5-cleanup | test step completed 5-cleanup logger.go:42: 23:26:50 | ctlplane-nodeselectors | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (390.28s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-nodeselectors (388.60s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ grep Bound ++ awk '{print $6}' ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 6m40s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ oc apply -f - ++ cat serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:27:13 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:27:13 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:27:14 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:27:14 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:27:15 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:27:15 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:27:15 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-tls-cert-rotation === PAUSE kuttl/harness/ctlplane-tls-cert-rotation === CONT kuttl/harness/ctlplane-tls-cert-rotation logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | starting test step 0-deploy-openstack-tls-ingress-only logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c oc kustomize ../../../../config/samples/tls/tls_ingress | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:27:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Waiting for OpenStack control plane to be ready... logger.go:42: 23:30:37 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:30:37 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Fail if internal https endpoints are registered" oc exec -i openstackclient -n $NAMESPACE -- bash -c "openstack endpoint list --interface internal -f value -c URL" | grep 'https:' && exit 1 exit 0 ] logger.go:42: 23:30:37 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Fail if internal https endpoints are registered logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb internalDbAddress use tcp" oc get -n $NAMESPACE OVNDBCluster ovndbcluster-sb -o jsonpath={.status.internalDbAddress} | grep -q tcp ] logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb internalDbAddress use tcp logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb DB connection use tcp" oc exec -i statefulset/ovsdbserver-sb -n $NAMESPACE -- bash -c "ovn-sbctl --no-leader-only get-connection | grep -q ptcp" ] logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb DB connection use tcp logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "ovsdbserver-sb" out of: ovsdbserver-sb, openstack-network-exporter logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check nova transport_url use tcp" oc exec -i statefulset/nova-cell1-conductor -n $NAMESPACE -- bash -c "grep transport_url /etc/nova/nova.conf.d/01-nova.conf | grep -q 'ssl=0'" ] logger.go:42: 23:30:40 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check nova transport_url use tcp logger.go:42: 23:30:41 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check neutron ovn_sb_connection url tcp address" oc exec -i deployment/neutron -n $NAMESPACE -- bash -c "grep ovn_sb_connection /etc/neutron/neutron.conf.d/01-neutron.conf | grep -q tcp" ] logger.go:42: 23:30:41 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check neutron ovn_sb_connection url tcp address logger.go:42: 23:30:41 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "neutron-api" out of: neutron-api, neutron-httpd logger.go:42: 23:30:42 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:30:42 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Waiting for OpenStack control plane to be ready... logger.go:42: 23:31:11 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:31:11 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Fail if internal https endpoints are registered" oc exec -i openstackclient -n $NAMESPACE -- bash -c "openstack endpoint list --interface internal -f value -c URL" | grep 'https:' && exit 1 exit 0 ] logger.go:42: 23:31:11 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Fail if internal https endpoints are registered logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb internalDbAddress use tcp" oc get -n $NAMESPACE OVNDBCluster ovndbcluster-sb -o jsonpath={.status.internalDbAddress} | grep -q tcp ] logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb internalDbAddress use tcp logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb DB connection use tcp" oc exec -i statefulset/ovsdbserver-sb -n $NAMESPACE -- bash -c "ovn-sbctl --no-leader-only get-connection | grep -q ptcp" ] logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb DB connection use tcp logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "ovsdbserver-sb" out of: ovsdbserver-sb, openstack-network-exporter logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check nova transport_url use tcp" oc exec -i statefulset/nova-cell1-conductor -n $NAMESPACE -- bash -c "grep transport_url /etc/nova/nova.conf.d/01-nova.conf | grep -q 'ssl=0'" ] logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check nova transport_url use tcp logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check neutron ovn_sb_connection url tcp address" oc exec -i deployment/neutron -n $NAMESPACE -- bash -c "grep ovn_sb_connection /etc/neutron/neutron.conf.d/01-neutron.conf | grep -q tcp" ] logger.go:42: 23:31:13 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check neutron ovn_sb_connection url tcp address logger.go:42: 23:31:14 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "neutron-api" out of: neutron-api, neutron-httpd logger.go:42: 23:31:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:31:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Waiting for OpenStack control plane to be ready... logger.go:42: 23:31:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:31:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "Fail if internal https endpoints are registered" oc exec -i openstackclient -n $NAMESPACE -- bash -c "openstack endpoint list --interface internal -f value -c URL" | grep 'https:' && exit 1 exit 0 ] logger.go:42: 23:31:15 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Fail if internal https endpoints are registered logger.go:42: 23:31:17 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb internalDbAddress use tcp" oc get -n $NAMESPACE OVNDBCluster ovndbcluster-sb -o jsonpath={.status.internalDbAddress} | grep -q tcp ] logger.go:42: 23:31:17 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb internalDbAddress use tcp logger.go:42: 23:31:17 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check ovn sb DB connection use tcp" oc exec -i statefulset/ovsdbserver-sb -n $NAMESPACE -- bash -c "ovn-sbctl --no-leader-only get-connection | grep -q ptcp" ] logger.go:42: 23:31:17 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check ovn sb DB connection use tcp logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "ovsdbserver-sb" out of: ovsdbserver-sb, openstack-network-exporter logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check nova transport_url use tcp" oc exec -i statefulset/nova-cell1-conductor -n $NAMESPACE -- bash -c "grep transport_url /etc/nova/nova.conf.d/01-nova.conf | grep -q 'ssl=0'" ] logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check nova transport_url use tcp logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | running command: [sh -c echo "check neutron ovn_sb_connection url tcp address" oc exec -i deployment/neutron -n $NAMESPACE -- bash -c "grep ovn_sb_connection /etc/neutron/neutron.conf.d/01-neutron.conf | grep -q tcp" ] logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | check neutron ovn_sb_connection url tcp address logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | Defaulted container "neutron-api" out of: neutron-api, neutron-httpd logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/0-deploy-openstack-tls-ingress-only | test step completed 0-deploy-openstack-tls-ingress-only logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/1-deploy-openstack | starting test step 1-deploy-openstack logger.go:42: 23:31:18 | ctlplane-tls-cert-rotation/1-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:31:19 | ctlplane-tls-cert-rotation/1-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 23:31:19 | ctlplane-tls-cert-rotation/1-deploy-openstack | test step completed 1-deploy-openstack logger.go:42: 23:31:19 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | starting test step 2-get-endpoints-certs logger.go:42: 23:31:19 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "Get fingerprints of all service certs" oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_endpoint_fingerprints.sh > /tmp/endpoint_fingerprints_before ] logger.go:42: 23:31:19 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Get fingerprints of all service certs logger.go:42: 23:31:20 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:31:20 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ awk -F/ '{print $3}' logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:24 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | 40D7CDE3027F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:162:provider=default logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'nova-public-openstack-kuttl-tests.apps-crc.testing:443 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | 4087F4C5977F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:162:provider=default logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'barbican-public-openstack-kuttl-tests.apps-crc.testing:443 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | 40E741118C7F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:162:provider=default logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'keystone-public-openstack-kuttl-tests.apps-crc.testing:443 B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:25 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | 4057371AE47F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:162:provider=default logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'neutron-public-openstack-kuttl-tests.apps-crc.testing:443 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'swift-public-openstack-kuttl-tests.apps-crc.testing:443 F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | 4067824E877F0000:error:1608010C:STORE routines:ossl_store_handle_load_result:unsupported:crypto/store/store_result.c:162:provider=default logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:26 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:27 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Could not find certificate from /dev/stdin logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print= logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n '' ]] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF ]] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'cinder-public-openstack-kuttl-tests.apps-crc.testing:443 D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + finger_print=22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + [[ -n 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA ]] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | + echo 'placement-public-openstack-kuttl-tests.apps-crc.testing:443 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA' logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:31:28 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Waiting for OpenStack control plane to be ready... logger.go:42: 23:33:39 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:33:39 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "Fail if internal http endpoints are registered" oc exec -i openstackclient -n $NAMESPACE -- bash -c "openstack endpoint list --interface internal -f value -c URL" | grep 'http:' && exit 1 exit 0 ] logger.go:42: 23:33:39 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Fail if internal http endpoints are registered logger.go:42: 23:33:41 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "check ovn sb internalDbAddress use ssl" oc get -n $NAMESPACE OVNDBCluster ovndbcluster-sb -o jsonpath={.status.internalDbAddress} | grep -q ssl ] logger.go:42: 23:33:41 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | check ovn sb internalDbAddress use ssl logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "check ovn sb DB connection use ssl" oc exec -i statefulset/ovsdbserver-sb -n $NAMESPACE -- bash -c "ovn-sbctl --no-leader-only get-connection | grep -q pssl" ] logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | check ovn sb DB connection use ssl logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Defaulted container "ovsdbserver-sb" out of: ovsdbserver-sb, openstack-network-exporter logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "check nova transport_url use ssl" oc exec -i statefulset/nova-cell1-conductor -n $NAMESPACE -- bash -c "grep transport_url /etc/nova/nova.conf.d/01-nova.conf | grep -q 'ssl=1'" ] logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | check nova transport_url use ssl logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | running command: [sh -c echo "check neutron ovn_sb_connection url ssl" oc exec -i deployment/neutron -n $NAMESPACE -- bash -c "grep ovn_sb_connection /etc/neutron/neutron.conf.d/01-neutron.conf| grep -q ssl" ] logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | check neutron ovn_sb_connection url ssl logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | Defaulted container "neutron-api" out of: neutron-api, neutron-httpd logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/2-get-endpoints-certs | test step completed 2-get-endpoints-certs logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/3-change-cert-duration | starting test step 3-change-cert-duration logger.go:42: 23:33:42 | ctlplane-tls-cert-rotation/3-change-cert-duration | running command: [sh -c oc kustomize ../../../../config/samples/tls/custom_duration | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:33:43 | ctlplane-tls-cert-rotation/3-change-cert-duration | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 23:33:44 | ctlplane-tls-cert-rotation/3-change-cert-duration | test step completed 3-change-cert-duration logger.go:42: 23:33:44 | ctlplane-tls-cert-rotation/4- | starting test step 4- logger.go:42: 23:33:44 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:33:44 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:33:45 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:33:46 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:33:46 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:33:46 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:33:46 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:33:46 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:33:47 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:33:47 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:33:47 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:33:47 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:33:47 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:33:48 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:33:48 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:33:48 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:33:48 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:33:48 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:33:49 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:33:49 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:33:49 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:33:49 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:33:49 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:33:50 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:33:51 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack at 10.217.4.45:3306. logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Get fingerprints of all service certs" oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_endpoint_fingerprints.sh > /tmp/endpoint_fingerprints_after ] logger.go:42: 23:33:53 | ctlplane-tls-cert-rotation/4- | Get fingerprints of all service certs logger.go:42: 23:33:54 | ctlplane-tls-cert-rotation/4- | error: unable to upgrade connection: container not found ("openstackclient") logger.go:42: 23:33:54 | ctlplane-tls-cert-rotation/4- | command failure, skipping 1 additional commands logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from rabbitmq at 10.217.5.89:15691. logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from rabbitmq at 10.217.5.89:5671. logger.go:42: 23:33:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from rabbitmq at 10.217.5.89:15671. logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6642. logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6644. logger.go:42: 23:33:56 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:1981. logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6641. logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6643. logger.go:42: 23:33:57 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:33:58 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:1981. logger.go:42: 23:33:58 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:33:58 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:00 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:00 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:00 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:00 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:00 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:01 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:01 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:01 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:02 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:02 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:02 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:34:02 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:02 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack at 10.217.4.45:3306. logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:03 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:04 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:04 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:04 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:04 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:05 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:06 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6642. logger.go:42: 23:34:06 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:06 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6644. logger.go:42: 23:34:06 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:06 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:1981. logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6641. logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6643. logger.go:42: 23:34:07 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:08 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:1981. logger.go:42: 23:34:08 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:08 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:09 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:09 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:09 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:09 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:09 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:10 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:10 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:10 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:10 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:11 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:11 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:34:11 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack at 10.217.4.45:3306. logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:12 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:13 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:13 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:13 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:13 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:14 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:15 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6642. logger.go:42: 23:34:15 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:15 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6644. logger.go:42: 23:34:15 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:16 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:1981. logger.go:42: 23:34:16 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:16 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:16 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6641. logger.go:42: 23:34:16 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:17 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6643. logger.go:42: 23:34:17 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:17 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:1981. logger.go:42: 23:34:18 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:18 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:18 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:18 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:18 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:19 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:19 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:19 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:19 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:19 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:20 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:20 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:20 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:34:20 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:20 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:21 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:22 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:23 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:23 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:23 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:23 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:23 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:24 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:34:24 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:25 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:6644. logger.go:42: 23:34:25 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:27 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:1981. logger.go:42: 23:34:27 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:27 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:28 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6641. logger.go:42: 23:34:28 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:28 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:6643. logger.go:42: 23:34:28 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:29 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-nb-0 at 10.217.5.12:1981. logger.go:42: 23:34:29 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:29 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:30 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:30 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:30 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:31 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:31 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:31 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:31 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:32 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:32 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:32 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:33 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:34:33 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:33 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack at 10.217.4.45:3306. logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:34 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:35 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:35 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:35 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:35 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:36 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:36 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:36 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:36 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:36 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:34:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:38 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:34:38 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:38 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:39 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:34:39 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:39 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:34:39 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:39 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:34:40 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:40 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:40 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:40 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:40 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:41 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack-cell1 at 10.217.4.139:3306. logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from openstack at 10.217.4.45:3306. logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:42 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:43 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:43 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:43 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:44 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:44 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:44 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:44 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:44 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:34:45 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:46 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:34:46 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:46 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:46 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:34:46 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:47 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:34:47 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:47 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:34:47 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:47 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:48 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:48 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:48 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:48 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:48 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:49 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:49 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:49 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:49 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:49 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:50 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:51 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:51 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:51 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:51 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:34:52 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:34:53 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:34:53 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:34:53 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:34:53 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:34:54 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:34:55 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:34:55 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:34:55 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:34:55 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:34:56 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:34:57 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:34:57 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:34:57 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:34:57 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:34:57 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:34:58 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:34:59 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:00 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:01 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:01 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:03 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ovsdbserver-sb-0 at 10.217.4.89:1981. logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:04 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:05 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:05 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:05 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:05 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:06 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:07 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:08 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:09 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:10 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:10 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:10 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:10 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:10 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:11 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:11 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:11 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:11 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:11 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:12 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:13 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:13 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:13 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:13 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:35:13 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:14 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:15 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:15 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:15 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:15 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:15 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:16 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:17 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:18 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:18 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:18 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:18 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:18 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:19 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:19 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:20 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:21 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:21 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:21 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:22 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:35:22 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:22 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:22 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:22 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:23 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:23 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:23 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:23 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:23 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:24 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:25 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:25 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:25 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:26 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:26 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:26 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:26 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:26 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:27 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:28 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:28 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:28 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:29 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:30 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:30 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:35:30 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:30 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:31 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:32 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:32 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:32 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:32 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:33 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:34 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:35 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:35 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:35 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:35 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:35 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:36 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:37 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:37 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:37 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Error retrieving certificate from ceilometer-internal at 10.217.5.237:3000. logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:38 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:39 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:39 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:39 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:39 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:39 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:40 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:40 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:40 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:40 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:40 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:41 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:42 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:43 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:44 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:44 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:44 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:44 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:44 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:45 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:45 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:45 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:45 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:45 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:46 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:46 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:46 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:35:46 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:46 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:47 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:48 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:49 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:49 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:50 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:51 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:35:51 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:35:51 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:35:51 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:35:51 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:35:52 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:35:52 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:35:52 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:35:52 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:35:53 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:35:53 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:35:53 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:35:53 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:35:53 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:35:54 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:35:54 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:35:54 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:35:54 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:35:55 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:35:56 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:35:56 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:35:56 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:35:56 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:35:57 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:35:58 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:35:58 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:35:58 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:35:58 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:35:59 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:35:59 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:35:59 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:35:59 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:35:59 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:36:00 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:36:01 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:36:01 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:36:01 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:36:02 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:36:02 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:36:02 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:36:02 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:36:02 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:36:03 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:36:03 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:36:03 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:36:03 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:36:03 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:36:04 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 DO NOT match the secret. logger.go:42: 23:36:04 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:36:04 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 DO NOT match the secret. logger.go:42: 23:36:04 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:36:04 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 DO NOT match the secret. logger.go:42: 23:36:05 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:36:05 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:36:05 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:36:05 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:36:05 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 5671 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15671 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | - rabbitmq-cell1 on port 15691 logger.go:42: 23:36:06 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 DO NOT match the secret. logger.go:42: 23:36:07 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:36:08 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 DO NOT match the secret. logger.go:42: 23:36:08 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:36:08 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 DO NOT match the secret. logger.go:42: 23:36:08 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:36:09 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:36:09 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:36:09 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:36:09 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:36:09 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:36:10 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:36:10 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:36:10 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:36:10 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:36:10 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:36:11 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:36:11 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:36:11 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:36:11 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:36:12 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:36:12 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:36:12 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:36:12 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:36:13 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:36:13 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:36:13 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:36:13 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:36:13 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:36:14 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:36:14 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:36:14 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:36:14 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:36:14 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | The following services had certificate mismatches: logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15691 logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 5671 logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | - rabbitmq on port 15671 logger.go:42: 23:36:15 | ctlplane-tls-cert-rotation/4- | command failure, skipping 2 additional commands logger.go:42: 23:36:16 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:36:16 | ctlplane-tls-cert-rotation/4- | Checking rotation of non API service certificates... logger.go:42: 23:36:16 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq (ClusterIP: 10.217.5.89, Ports: 15691 5671 15671) logger.go:42: 23:36:16 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15691... logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 5671... logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq on port 15671... logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:36:17 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.89, Ports: 6642 6644 1981) logger.go:42: 23:36:18 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:36:18 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:36:18 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:36:18 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:36:18 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.12, Ports: 6641 6643 1981) logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:36:19 | ctlplane-tls-cert-rotation/4- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:36:20 | ctlplane-tls-cert-rotation/4- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:36:20 | ctlplane-tls-cert-rotation/4- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.237, Ports: 3000) logger.go:42: 23:36:20 | ctlplane-tls-cert-rotation/4- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:36:21 | ctlplane-tls-cert-rotation/4- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:36:21 | ctlplane-tls-cert-rotation/4- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.129, Ports: 5671 15671 15691) logger.go:42: 23:36:21 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:36:21 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:36:21 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:36:22 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:36:22 | ctlplane-tls-cert-rotation/4- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:36:22 | ctlplane-tls-cert-rotation/4- | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:36:22 | ctlplane-tls-cert-rotation/4- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.139, Ports: 3306) logger.go:42: 23:36:22 | ctlplane-tls-cert-rotation/4- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | Checking database: openstack (ClusterIP: 10.217.4.45, Ports: 3306) logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | Connecting to openstack on port 3306... logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Get fingerprints of all service certs" oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_endpoint_fingerprints.sh > /tmp/endpoint_fingerprints_after ] logger.go:42: 23:36:23 | ctlplane-tls-cert-rotation/4- | Get fingerprints of all service certs logger.go:42: 23:36:24 | ctlplane-tls-cert-rotation/4- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:36:24 | ctlplane-tls-cert-rotation/4- | ++ awk -F/ '{print $3}' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=84:AD:19:50:32:5E:D7:15:81:78:CB:91:20:EF:E7:DA:C5:39:A8:DE logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n 84:AD:19:50:32:5E:D7:15:81:78:CB:91:20:EF:E7:DA:C5:39:A8:DE ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'neutron-internal.openstack-kuttl-tests.svc:9696 84:AD:19:50:32:5E:D7:15:81:78:CB:91:20:EF:E7:DA:C5:39:A8:DE' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'nova-public-openstack-kuttl-tests.apps-crc.testing:443 D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=3B:84:D7:4C:E9:A1:91:34:BB:5A:FF:82:55:1A:EB:20:8B:61:8A:C6 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n 3B:84:D7:4C:E9:A1:91:34:BB:5A:FF:82:55:1A:EB:20:8B:61:8A:C6 ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'keystone-internal.openstack-kuttl-tests.svc:5000 3B:84:D7:4C:E9:A1:91:34:BB:5A:FF:82:55:1A:EB:20:8B:61:8A:C6' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'barbican-public-openstack-kuttl-tests.apps-crc.testing:443 A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=EA:62:52:9A:44:2E:BF:46:C1:66:F6:2C:31:1C:EA:F6:E4:AE:45:5B logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n EA:62:52:9A:44:2E:BF:46:C1:66:F6:2C:31:1C:EA:F6:E4:AE:45:5B ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'swift-internal.openstack-kuttl-tests.svc:8080 EA:62:52:9A:44:2E:BF:46:C1:66:F6:2C:31:1C:EA:F6:E4:AE:45:5B' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + finger_print=5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ -n 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + echo 'keystone-public-openstack-kuttl-tests.apps-crc.testing:443 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | + [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:26 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=AC:D0:CD:72:6F:6A:C5:21:C8:17:29:50:65:A8:B6:D5:A9:6E:B8:B1 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n AC:D0:CD:72:6F:6A:C5:21:C8:17:29:50:65:A8:B6:D5:A9:6E:B8:B1 ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'placement-internal.openstack-kuttl-tests.svc:8778 AC:D0:CD:72:6F:6A:C5:21:C8:17:29:50:65:A8:B6:D5:A9:6E:B8:B1' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=46:98:15:46:2B:A8:DB:3E:BE:71:9E:8B:87:48:BD:3B:28:EC:E0:63 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 46:98:15:46:2B:A8:DB:3E:BE:71:9E:8B:87:48:BD:3B:28:EC:E0:63 ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'nova-internal.openstack-kuttl-tests.svc:8774 46:98:15:46:2B:A8:DB:3E:BE:71:9E:8B:87:48:BD:3B:28:EC:E0:63' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'neutron-public-openstack-kuttl-tests.apps-crc.testing:443 CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'swift-public-openstack-kuttl-tests.apps-crc.testing:443 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=5D:31:97:35:71:2C:EF:1F:66:73:C4:FA:2B:4D:E6:CD:36:AB:A4:0E logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 5D:31:97:35:71:2C:EF:1F:66:73:C4:FA:2B:4D:E6:CD:36:AB:A4:0E ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'barbican-internal.openstack-kuttl-tests.svc:9311 5D:31:97:35:71:2C:EF:1F:66:73:C4:FA:2B:4D:E6:CD:36:AB:A4:0E' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=C6:16:4D:C6:68:FB:5A:DC:E8:93:57:F1:CB:A2:02:83:CC:94:AB:70 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n C6:16:4D:C6:68:FB:5A:DC:E8:93:57:F1:CB:A2:02:83:CC:94:AB:70 ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'cinder-internal.openstack-kuttl-tests.svc:8776 C6:16:4D:C6:68:FB:5A:DC:E8:93:57:F1:CB:A2:02:83:CC:94:AB:70' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=35:D3:3F:46:72:BC:36:A2:53:4D:27:EE:FE:9C:F3:66:BE:20:BA:7A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 35:D3:3F:46:72:BC:36:A2:53:4D:27:EE:FE:9C:F3:66:BE:20:BA:7A ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'glance-default-internal.openstack-kuttl-tests.svc:9292 35:D3:3F:46:72:BC:36:A2:53:4D:27:EE:FE:9C:F3:66:BE:20:BA:7A' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'cinder-public-openstack-kuttl-tests.apps-crc.testing:443 BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + for url in $(openstack endpoint list -c URL -f value | awk -F/ '{print $3}') logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed -E 's|^[^:/]+://([^:/]+)(:([0-9]+))?.*|\1:\3|' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ openssl x509 -fingerprint -noout -in /dev/stdin logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ sed 's/.* Fingerprint=//' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + finger_print=92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + [[ -n 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA ]] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'placement-public-openstack-kuttl-tests.apps-crc.testing:443 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | running command: [sh -c echo "Check if all services from before are present in after and have valid fingerprints" bash -s < ../../common/osp_check_fingerprints.sh ] logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Check if all services from before are present in after and have valid fingerprints logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'nova-public-openstack-kuttl-tests.apps-crc.testing:443 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=nova-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F nova-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint nova-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint nova-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A = D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A - after: D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: 7C:FB:AF:73:94:D8:B6:C4:9C:CA:27:67:7B:94:ED:B1:A5:7B:3B:0A - after: D3:62:50:1D:9B:52:C3:67:C7:C0:25:CB:71:AC:DF:77:C3:D8:6C:C6 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'barbican-public-openstack-kuttl-tests.apps-crc.testing:443 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F barbican-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint barbican-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint barbican-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E = A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E - after: A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: 9D:FD:52:67:85:6F:2A:B6:CC:12:6F:5B:16:38:FF:B2:B6:F3:D5:6E - after: A6:0C:37:F5:14:48:A2:E5:C3:40:E0:72:F6:B8:62:28:50:6D:AB:17 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'keystone-public-openstack-kuttl-tests.apps-crc.testing:443 B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F keystone-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint keystone-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint keystone-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 = 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 - after: 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: B5:5D:88:E5:C4:FE:0D:3C:12:32:34:A1:37:F0:B3:A7:8F:F5:51:01 - after: 5B:BD:94:8F:73:C8:0F:4B:1A:18:C0:CF:FB:5F:7A:DE:E0:39:5E:2F logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 = 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 - after: 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: 0D:59:FC:61:00:C7:F0:5E:36:07:B3:C6:4A:BC:33:33:D9:CE:9C:55 - after: 62:8E:70:A9:10:04:BF:F0:B0:0D:7D:D2:C7:12:9A:13:0D:BB:59:EB logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'neutron-public-openstack-kuttl-tests.apps-crc.testing:443 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F neutron-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint neutron-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint neutron-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 = CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 - after: CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: 88:A9:CC:69:68:FF:73:18:76:EA:94:CD:8E:96:30:8E:62:D9:1B:D8 - after: CE:92:1C:0C:1A:23:34:3E:8C:B6:4E:42:6B:29:EE:85:1F:14:D0:6A logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'swift-public-openstack-kuttl-tests.apps-crc.testing:443 F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=swift-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F swift-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint swift-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint swift-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E = 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E - after: 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: F0:7E:9B:0E:B8:F5:10:00:F4:6A:47:CC:5E:C2:CA:3D:99:7F:55:0E - after: 90:DC:56:76:B2:36:CF:B7:03:EA:1D:67:1C:B0:C2:92:50:46:B0:B4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'cinder-public-openstack-kuttl-tests.apps-crc.testing:443 D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F cinder-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint cinder-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint cinder-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF = BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF - after: BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: D6:94:78:04:B0:42:68:AC:D2:9E:0F:EB:3E:89:D6:F2:75:B5:B2:DF - after: BD:A6:22:11:BB:18:23:43:19:9F:6A:C2:02:84:7A:72:72:B3:4C:D4 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ echo 'placement-public-openstack-kuttl-tests.apps-crc.testing:443 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{print "service_name="$1" fp_before="$2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + eval service_name=placement-public-openstack-kuttl-tests.apps-crc.testing:443 fp_before=22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ service_name=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ fp_before=22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ awk '{ print $2}' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | ++ grep -F placement-public-openstack-kuttl-tests.apps-crc.testing:443 /tmp/endpoint_fingerprints_after logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + fp_after=92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo -n 'Endpoint placement-public-openstack-kuttl-tests.apps-crc.testing:443 - ' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | Endpoint placement-public-openstack-kuttl-tests.apps-crc.testing:443 - + '[' -z 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + '[' 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA = 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA ']' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + echo 'OK cert rotated - before: 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA - after: 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA' logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | OK cert rotated - before: 22:72:80:6F:77:81:A7:73:58:17:A8:BD:6C:8B:3E:6A:26:7B:66:EA - after: 92:13:EB:94:7A:9B:80:92:CA:80:07:74:26:33:9A:49:8B:75:FC:CA logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + IFS= logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + read -r before logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | + exit 0 logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/4- | test step completed 4- logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/5-cleanup | starting test step 5-cleanup logger.go:42: 23:36:27 | ctlplane-tls-cert-rotation/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:36:28 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:36:29 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:36:29 | ctlplane-tls-cert-rotation/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:36:34 | ctlplane-tls-cert-rotation/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:36:34 | ctlplane-tls-cert-rotation/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:36:34 | ctlplane-tls-cert-rotation/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:36:34 | ctlplane-tls-cert-rotation/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:37:02 | ctlplane-tls-cert-rotation/5-cleanup | test step completed 5-cleanup logger.go:42: 23:37:02 | ctlplane-tls-cert-rotation | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (588.24s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-tls-cert-rotation (586.65s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + NS=openstack-kuttl-tests ++ cut -d / -f 2 ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 9m59s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ oc apply -f - ++ cat serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ oc apply -f - ++ cat rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ oc apply -f - ++ cat role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:37:27 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:37:27 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:37:27 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:37:27 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:37:28 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:37:28 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:37:29 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-tls-custom-issuers === PAUSE kuttl/harness/ctlplane-tls-custom-issuers === CONT kuttl/harness/ctlplane-tls-custom-issuers logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | starting test step 0-deploy-custom-issuers logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | running command: [sh -c oc apply -n $NAMESPACE -f ../../common/custom-internal-issuer.yaml oc apply -n $NAMESPACE -f ../../common/custom-ingress-issuer.yaml ] logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | issuer.cert-manager.io/rootca-internal-custom created logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | certificate.cert-manager.io/rootca-internal-custom created logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | issuer.cert-manager.io/rootca-ingress-custom created logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | certificate.cert-manager.io/rootca-ingress-custom created logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/0-deploy-custom-issuers | test step completed 0-deploy-custom-issuers logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/1-deploy-openstack | starting test step 1-deploy-openstack logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/1-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/tls/custom_issuers | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/1-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/1-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:37:29 | ctlplane-tls-custom-issuers/1-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/1-deploy-openstack | test step completed 1-deploy-openstack logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | starting test step 2- logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | Checking rotation of non API service certificates... logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | Checking service: rabbitmq (ClusterIP: 10.217.4.185, Ports: 15671 15691 5671) logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq on port 15671... logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:41:55 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq on port 15691... logger.go:42: 23:41:56 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:41:56 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq on port 5671... logger.go:42: 23:41:56 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:41:56 | ctlplane-tls-custom-issuers/2- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.77, Ports: 6642 6644 1981) logger.go:42: 23:41:56 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:41:57 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:41:57 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:41:57 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:41:57 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:41:57 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.4.76, Ports: 6641 6643 1981) logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:41:58 | ctlplane-tls-custom-issuers/2- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:41:59 | ctlplane-tls-custom-issuers/2- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:41:59 | ctlplane-tls-custom-issuers/2- | Checking service: ceilometer-internal (ClusterIP: 10.217.4.194, Ports: 3000) logger.go:42: 23:41:59 | ctlplane-tls-custom-issuers/2- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:41:59 | ctlplane-tls-custom-issuers/2- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.4.70, Ports: 15691 5671 15671) logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:42:00 | ctlplane-tls-custom-issuers/2- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:42:01 | ctlplane-tls-custom-issuers/2- | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:42:01 | ctlplane-tls-custom-issuers/2- | Checking database: openstack-cell1 (ClusterIP: 10.217.4.181, Ports: 3306) logger.go:42: 23:42:01 | ctlplane-tls-custom-issuers/2- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:42:01 | ctlplane-tls-custom-issuers/2- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | Checking database: openstack (ClusterIP: 10.217.4.64, Ports: 3306) logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | Connecting to openstack on port 3306... logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | running command: [sh -c echo "Checking issuer of internal certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-internal-custom" "internal" ] logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | Checking issuer of internal certificates... logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | + EXPECTED_ISSUER=rootca-internal-custom logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | + ENDPOINT_TYPE=internal logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | + ISSUER_MISMATCHES= logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | + ALL_MATCHED=1 logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:42:02 | ctlplane-tls-custom-issuers/2- | ++ grep keystone-public logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + http_status=300 logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + [[ 300 -ge 200 ]] logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + [[ 300 -lt 400 ]] logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + return 0 logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | + endpoint_filter=svc logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:42:04 | ctlplane-tls-custom-issuers/2- | ++ grep svc logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking nova-internal.openstack-kuttl-tests.svc:8774 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking nova-internal.openstack-kuttl-tests.svc:8774 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking neutron-internal.openstack-kuttl-tests.svc:9696 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking neutron-internal.openstack-kuttl-tests.svc:9696 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking placement-internal.openstack-kuttl-tests.svc:8778 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking placement-internal.openstack-kuttl-tests.svc:8778 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local 'endpoint_url=https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking swift-internal.openstack-kuttl-tests.svc:8080 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking swift-internal.openstack-kuttl-tests.svc:8080 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking barbican-internal.openstack-kuttl-tests.svc:9311 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking barbican-internal.openstack-kuttl-tests.svc:9311 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking cinder-internal.openstack-kuttl-tests.svc:8776 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking cinder-internal.openstack-kuttl-tests.svc:8776 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ echo https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292... logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292...' logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:06 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | +++ echo https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + echo 'Checking keystone-internal.openstack-kuttl-tests.svc:5000 ...' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000...' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | Checking keystone-internal.openstack-kuttl-tests.svc:5000 ... logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000... logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ local host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-internal-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-internal-custom ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + '[' 1 -eq 1 ']' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + echo 'All certificates match the custom issuer rootca-internal-custom' logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + exit 0 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | All certificates match the custom issuer rootca-internal-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | running command: [sh -c echo "Checking issuer of ingress certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-ingress-custom" "public" ] logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | Checking issuer of ingress certificates... logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + EXPECTED_ISSUER=rootca-ingress-custom logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + ENDPOINT_TYPE=public logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + ISSUER_MISMATCHES= logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | + ALL_MATCHED=1 logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:42:07 | ctlplane-tls-custom-issuers/2- | ++ grep keystone-public logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + http_status=300 logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + [[ 300 -ge 200 ]] logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + [[ 300 -lt 400 ]] logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + return 0 logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | + endpoint_filter=public logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ grep public logger.go:42: 23:42:09 | ctlplane-tls-custom-issuers/2- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ local 'endpoint_url=https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | +++ echo 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | + echo 'Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ local host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:10 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ extract_host_port https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local endpoint_url=https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ echo https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + for retry in {1..5} logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ get_issuer_cn neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ local output logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl x509 -noout -issuer logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | +++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + ISSUER=rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + break logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + '[' 1 -eq 1 ']' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + echo 'All certificates match the custom issuer rootca-ingress-custom' logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | + exit 0 logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | All certificates match the custom issuer rootca-ingress-custom logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/2- | test step completed 2- logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/3-deploy-openstack | starting test step 3-deploy-openstack logger.go:42: 23:42:11 | ctlplane-tls-custom-issuers/3-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/3-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/3-deploy-openstack | test step completed 3-deploy-openstack logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | starting test step 4-rotate-service-certs logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | running command: [sh -c echo "Deleting secrets..." oc get secret -l service-cert -n $NAMESPACE -o name > /tmp/deleted-secrets.txt oc delete secret -l service-cert -n $NAMESPACE ] logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Deleting secrets... logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-barbican-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-barbican-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-cinder-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-cinder-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-glance-default-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-keystone-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-keystone-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-memcached-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-neutron-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-neutron-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-internal-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:42:12 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-public-route" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-nova-public-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-ovn-metrics" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-placement-internal-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-placement-public-route" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-placement-public-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-swift-internal-svc" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-swift-public-route" deleted logger.go:42: 23:42:13 | ctlplane-tls-custom-issuers/4-rotate-service-certs | secret "cert-swift-public-svc" deleted logger.go:42: 23:42:18 | ctlplane-tls-custom-issuers/4-rotate-service-certs | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:42:18 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Waiting for OpenStack control plane to be ready... logger.go:42: 23:44:23 | ctlplane-tls-custom-issuers/4-rotate-service-certs | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:44:23 | ctlplane-tls-custom-issuers/4-rotate-service-certs | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:44:23 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking rotation of non API service certificates... logger.go:42: 23:44:24 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking service: rabbitmq (ClusterIP: 10.217.4.185, Ports: 15671 15691 5671) logger.go:42: 23:44:24 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq on port 15671... logger.go:42: 23:44:24 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:44:24 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq on port 15691... logger.go:42: 23:44:25 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:44:25 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq on port 5671... logger.go:42: 23:44:25 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:44:25 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.77, Ports: 6642 6644 1981) logger.go:42: 23:44:25 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:44:26 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:44:26 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:44:26 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:44:26 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:44:27 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:44:27 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.4.76, Ports: 6641 6643 1981) logger.go:42: 23:44:27 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:44:28 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking service: ceilometer-internal (ClusterIP: 10.217.4.194, Ports: 3000) logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Error retrieving certificate from ceilometer-internal at 10.217.4.194:3000. logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.4.70, Ports: 15691 5671 15671) logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:44:29 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking database: openstack-cell1 (ClusterIP: 10.217.4.181, Ports: 3306) logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:44:30 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking database: openstack (ClusterIP: 10.217.4.64, Ports: 3306) logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Connecting to openstack on port 3306... logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | running command: [sh -c echo "Checking issuer of internal certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-internal" "internal" ] logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking issuer of internal certificates... logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + EXPECTED_ISSUER=rootca-internal logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ENDPOINT_TYPE=internal logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER_MISMATCHES= logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ALL_MATCHED=1 logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:44:31 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ grep keystone-public logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + http_status=300 logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ 300 -ge 200 ]] logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ 300 -lt 400 ]] logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + return 0 logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + endpoint_filter=svc logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:44:33 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ grep svc logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking nova-internal.openstack-kuttl-tests.svc:8774 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking nova-internal.openstack-kuttl-tests.svc:8774 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking neutron-internal.openstack-kuttl-tests.svc:9696 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking neutron-internal.openstack-kuttl-tests.svc:9696 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking placement-internal.openstack-kuttl-tests.svc:8778 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking placement-internal.openstack-kuttl-tests.svc:8778 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local 'endpoint_url=https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking swift-internal.openstack-kuttl-tests.svc:8080 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking swift-internal.openstack-kuttl-tests.svc:8080 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking barbican-internal.openstack-kuttl-tests.svc:9311 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking barbican-internal.openstack-kuttl-tests.svc:9311 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking cinder-internal.openstack-kuttl-tests.svc:8776 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking cinder-internal.openstack-kuttl-tests.svc:8776 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking keystone-internal.openstack-kuttl-tests.svc:5000 ... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000... logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking keystone-internal.openstack-kuttl-tests.svc:5000 ...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000...' logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:44:35 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-internal logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-internal logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-internal logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-internal ]] logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + '[' 1 -eq 1 ']' logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'All certificates match the custom issuer rootca-internal' logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + exit 0 logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | All certificates match the custom issuer rootca-internal logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | running command: [sh -c echo "Checking issuer of ingress certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-public" "public" ] logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking issuer of ingress certificates... logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + EXPECTED_ISSUER=rootca-public logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ENDPOINT_TYPE=public logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER_MISMATCHES= logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ALL_MATCHED=1 logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:44:36 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ grep keystone-public logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + http_status=300 logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ 300 -ge 200 ]] logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ 300 -lt 400 ]] logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + return 0 logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + endpoint_filter=public logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:44:38 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ grep public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local 'endpoint_url=https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ extract_host_port https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local endpoint_url=https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ echo https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ get_issuer_cn neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ local output logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ output=issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ echo issuer=CN=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + ISSUER=rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ -n rootca-public ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + break logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | All certificates match the custom issuer rootca-public logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + '[' 1 -eq 1 ']' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + echo 'All certificates match the custom issuer rootca-public' logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | + exit 0 logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/4-rotate-service-certs | test step completed 4-rotate-service-certs logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/5-cleanup | starting test step 5-cleanup logger.go:42: 23:44:40 | ctlplane-tls-custom-issuers/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:44:41 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:44:42 | ctlplane-tls-custom-issuers/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:44:48 | ctlplane-tls-custom-issuers/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:44:48 | ctlplane-tls-custom-issuers/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:44:48 | ctlplane-tls-custom-issuers/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:44:48 | ctlplane-tls-custom-issuers/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/5-cleanup | test step completed 5-cleanup logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/6-deploy-openstack | starting test step 6-deploy-openstack logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/6-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/6-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/6-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:45:15 | ctlplane-tls-custom-issuers/6-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/6-deploy-openstack | test step completed 6-deploy-openstack logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/7- | starting test step 7- logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/7- | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/7- | Checking rotation of non API service certificates... logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/7- | Checking service: rabbitmq (ClusterIP: 10.217.5.55, Ports: 5671 15671 15691) logger.go:42: 23:49:25 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq on port 5671... logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq on port 15671... logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq on port 15691... logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:49:27 | ctlplane-tls-custom-issuers/7- | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.42, Ports: 6642 6644 1981) logger.go:42: 23:49:28 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:49:28 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:49:28 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:49:28 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:49:28 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:49:29 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:49:29 | ctlplane-tls-custom-issuers/7- | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.170, Ports: 6641 6643 1981) logger.go:42: 23:49:29 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:49:30 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:49:30 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:49:30 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:49:30 | ctlplane-tls-custom-issuers/7- | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:49:31 | ctlplane-tls-custom-issuers/7- | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:49:31 | ctlplane-tls-custom-issuers/7- | Checking service: ceilometer-internal (ClusterIP: 10.217.5.15, Ports: 3000) logger.go:42: 23:49:31 | ctlplane-tls-custom-issuers/7- | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:49:32 | ctlplane-tls-custom-issuers/7- | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:49:32 | ctlplane-tls-custom-issuers/7- | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.169, Ports: 5671 15671 15691) logger.go:42: 23:49:32 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:49:33 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:49:33 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:49:33 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:49:33 | ctlplane-tls-custom-issuers/7- | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:49:34 | ctlplane-tls-custom-issuers/7- | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:49:34 | ctlplane-tls-custom-issuers/7- | Checking database: openstack-cell1 (ClusterIP: 10.217.5.97, Ports: 3306) logger.go:42: 23:49:34 | ctlplane-tls-custom-issuers/7- | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:49:34 | ctlplane-tls-custom-issuers/7- | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:49:34 | ctlplane-tls-custom-issuers/7- | Checking database: openstack (ClusterIP: 10.217.5.153, Ports: 3306) logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | Connecting to openstack on port 3306... logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | running command: [sh -c echo "Checking issuer of internal certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-internal" "internal" ] logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | Checking issuer of internal certificates... logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | + EXPECTED_ISSUER=rootca-internal logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | + ENDPOINT_TYPE=internal logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | + ISSUER_MISMATCHES= logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | + ALL_MATCHED=1 logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:49:35 | ctlplane-tls-custom-issuers/7- | ++ grep keystone-public logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + http_status=300 logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + [[ 300 -ge 200 ]] logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + [[ 300 -lt 400 ]] logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + return 0 logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | + endpoint_filter=svc logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:49:37 | ctlplane-tls-custom-issuers/7- | ++ grep svc logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking nova-internal.openstack-kuttl-tests.svc:8774 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking nova-internal.openstack-kuttl-tests.svc:8774 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking neutron-internal.openstack-kuttl-tests.svc:9696 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking neutron-internal.openstack-kuttl-tests.svc:9696 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking placement-internal.openstack-kuttl-tests.svc:8778 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking placement-internal.openstack-kuttl-tests.svc:8778 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local 'endpoint_url=https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking swift-internal.openstack-kuttl-tests.svc:8080 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking swift-internal.openstack-kuttl-tests.svc:8080 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking barbican-internal.openstack-kuttl-tests.svc:9311 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking barbican-internal.openstack-kuttl-tests.svc:9311 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ echo https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Checking cinder-internal.openstack-kuttl-tests.svc:8776 ...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776...' logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Checking cinder-internal.openstack-kuttl-tests.svc:8776 ... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776... logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:49:39 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ echo https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ... logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292... logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + echo 'Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ...' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292...' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ echo https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | Checking keystone-internal.openstack-kuttl-tests.svc:5000 ... logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000... logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + echo 'Checking keystone-internal.openstack-kuttl-tests.svc:5000 ...' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000...' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-internal ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + [[ rootca-internal != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l ]] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + '[' 1 -eq 1 ']' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + echo 'All certificates match the custom issuer rootca-internal' logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + exit 0 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | All certificates match the custom issuer rootca-internal logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | running command: [sh -c echo "Checking issuer of ingress certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-public" "public" ] logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | Checking issuer of ingress certificates... logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + EXPECTED_ISSUER=rootca-public logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ENDPOINT_TYPE=public logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ISSUER_MISMATCHES= logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | + ALL_MATCHED=1 logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:49:40 | ctlplane-tls-custom-issuers/7- | ++ grep keystone-public logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + http_status=300 logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + [[ 300 -ge 200 ]] logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + [[ 300 -lt 400 ]] logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + return 0 logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | + endpoint_filter=public logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ openstack endpoint list -c URL -f value logger.go:42: 23:49:42 | ctlplane-tls-custom-issuers/7- | ++ grep public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local 'endpoint_url=https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ echo 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ echo https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ echo https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ echo https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ echo https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:44 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ echo https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ extract_host_port https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local endpoint_url=https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ echo https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + for retry in {1..5} logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ get_issuer_cn neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ local output logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | +++ openssl x509 -noout -issuer logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ output=issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ echo issuer=CN=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + ISSUER=rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ -n rootca-public ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + break logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + [[ rootca-public != \r\o\o\t\c\a\-\p\u\b\l\i\c ]] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | All certificates match the custom issuer rootca-public logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + '[' 1 -eq 1 ']' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + echo 'All certificates match the custom issuer rootca-public' logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | + exit 0 logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/7- | test step completed 7- logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | starting test step 8-deploy-custom-issuers logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | running command: [sh -c oc apply -n $NAMESPACE -f ../../common/custom-internal-issuer.yaml oc apply -n $NAMESPACE -f ../../common/custom-ingress-issuer.yaml ] logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | issuer.cert-manager.io/rootca-internal-custom unchanged logger.go:42: 23:49:45 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | certificate.cert-manager.io/rootca-internal-custom unchanged logger.go:42: 23:49:46 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | issuer.cert-manager.io/rootca-ingress-custom unchanged logger.go:42: 23:49:46 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | certificate.cert-manager.io/rootca-ingress-custom unchanged logger.go:42: 23:49:46 | ctlplane-tls-custom-issuers/8-deploy-custom-issuers | test step completed 8-deploy-custom-issuers logger.go:42: 23:49:46 | ctlplane-tls-custom-issuers/9-deploy-openstack | starting test step 9-deploy-openstack logger.go:42: 23:49:46 | ctlplane-tls-custom-issuers/9-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/tls/custom_issuers | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:49:47 | ctlplane-tls-custom-issuers/9-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 23:49:47 | ctlplane-tls-custom-issuers/9-deploy-openstack | test step completed 9-deploy-openstack logger.go:42: 23:49:47 | ctlplane-tls-custom-issuers/10-rotate-service-certs | starting test step 10-rotate-service-certs logger.go:42: 23:49:47 | ctlplane-tls-custom-issuers/10-rotate-service-certs | running command: [sh -c echo "Deleting secrets..." oc get secret -l service-cert -n $NAMESPACE -o name > /tmp/deleted-secrets.txt oc delete secret -l service-cert -n $NAMESPACE ] logger.go:42: 23:49:47 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Deleting secrets... logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-barbican-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-barbican-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-cinder-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-cinder-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-glance-default-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-keystone-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-keystone-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-memcached-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-neutron-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-neutron-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-nova-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-ovn-metrics" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-placement-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-placement-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-placement-public-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-swift-internal-svc" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-swift-public-route" deleted logger.go:42: 23:49:48 | ctlplane-tls-custom-issuers/10-rotate-service-certs | secret "cert-swift-public-svc" deleted logger.go:42: 23:49:54 | ctlplane-tls-custom-issuers/10-rotate-service-certs | running command: [sh -c echo "Waiting for OpenStack control plane to be ready..." oc wait openstackcontrolplane -n $NAMESPACE --for=condition=Ready --timeout=400s -l core.openstack.org/openstackcontrolplane ] logger.go:42: 23:49:54 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Waiting for OpenStack control plane to be ready... logger.go:42: 23:52:09 | ctlplane-tls-custom-issuers/10-rotate-service-certs | openstackcontrolplane.core.openstack.org/openstack condition met logger.go:42: 23:52:09 | ctlplane-tls-custom-issuers/10-rotate-service-certs | running command: [sh -c echo "Checking rotation of non API service certificates..." NAMESPACE=$NAMESPACE bash ../../common/osp_check_noapi_service_certs.sh ] logger.go:42: 23:52:09 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking rotation of non API service certificates... logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking service: rabbitmq (ClusterIP: 10.217.5.55, Ports: 5671 15671 15691) logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq on port 5671... logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq on port 5671 match the secret. logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq on port 15671... logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq on port 15671 match the secret. logger.go:42: 23:52:10 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq on port 15691... logger.go:42: 23:52:11 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq on port 15691 match the secret. logger.go:42: 23:52:11 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking service: ovsdbserver-sb-0 (ClusterIP: 10.217.4.42, Ports: 6642 6644 1981) logger.go:42: 23:52:11 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 6642... logger.go:42: 23:52:11 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 6642 match the secret. logger.go:42: 23:52:11 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 6644... logger.go:42: 23:52:12 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 6644 match the secret. logger.go:42: 23:52:12 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-sb-0 on port 1981... logger.go:42: 23:52:12 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-sb-0 on port 1981 match the secret. logger.go:42: 23:52:12 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking service: ovsdbserver-nb-0 (ClusterIP: 10.217.5.170, Ports: 6641 6643 1981) logger.go:42: 23:52:12 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 6641... logger.go:42: 23:52:13 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 6641 match the secret. logger.go:42: 23:52:13 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 6643... logger.go:42: 23:52:13 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 6643 match the secret. logger.go:42: 23:52:13 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ovsdbserver-nb-0 on port 1981... logger.go:42: 23:52:14 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ovsdbserver-nb-0 on port 1981 match the secret. logger.go:42: 23:52:14 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking service: ceilometer-internal (ClusterIP: 10.217.5.15, Ports: 3000) logger.go:42: 23:52:14 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to ceilometer-internal on port 3000... logger.go:42: 23:52:15 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for ceilometer-internal on port 3000 match the secret. logger.go:42: 23:52:15 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking service: rabbitmq-cell1 (ClusterIP: 10.217.5.169, Ports: 5671 15671 15691) logger.go:42: 23:52:15 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq-cell1 on port 5671... logger.go:42: 23:52:15 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq-cell1 on port 5671 match the secret. logger.go:42: 23:52:15 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq-cell1 on port 15671... logger.go:42: 23:52:16 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq-cell1 on port 15671 match the secret. logger.go:42: 23:52:16 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to rabbitmq-cell1 on port 15691... logger.go:42: 23:52:17 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for rabbitmq-cell1 on port 15691 match the secret. logger.go:42: 23:52:17 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking database: openstack-cell1 (ClusterIP: 10.217.5.97, Ports: 3306) logger.go:42: 23:52:17 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to openstack-cell1 on port 3306... logger.go:42: 23:52:17 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for openstack-cell1 on port 3306 match the secret. logger.go:42: 23:52:17 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking database: openstack (ClusterIP: 10.217.5.153, Ports: 3306) logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Connecting to openstack on port 3306... logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Certificates for openstack on port 3306 match the secret. logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | running command: [sh -c echo "Checking issuer of internal certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-internal-custom" "internal" ] logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking issuer of internal certificates... logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + EXPECTED_ISSUER=rootca-internal-custom logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ENDPOINT_TYPE=internal logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER_MISMATCHES= logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ALL_MATCHED=1 logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:52:18 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ grep keystone-public logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:52:20 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + http_status=300 logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ 300 -ge 200 ]] logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ 300 -lt 400 ]] logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + return 0 logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + endpoint_filter=svc logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:52:21 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ grep svc logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://nova-internal.openstack-kuttl-tests.svc:8774/v2.1 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! nova-internal.openstack-kuttl-tests.svc:8774 =~ :[0-9]+$ ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking nova-internal.openstack-kuttl-tests.svc:8774 ...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking nova-internal.openstack-kuttl-tests.svc:8774 ... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer nova-internal.openstack-kuttl-tests.svc:8774... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect nova-internal.openstack-kuttl-tests.svc:8774 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! neutron-internal.openstack-kuttl-tests.svc:9696 =~ :[0-9]+$ ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking neutron-internal.openstack-kuttl-tests.svc:9696 ...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking neutron-internal.openstack-kuttl-tests.svc:9696 ... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer neutron-internal.openstack-kuttl-tests.svc:9696... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect neutron-internal.openstack-kuttl-tests.svc:9696 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! placement-internal.openstack-kuttl-tests.svc:8778 =~ :[0-9]+$ ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking placement-internal.openstack-kuttl-tests.svc:8778 ... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking placement-internal.openstack-kuttl-tests.svc:8778 ...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer placement-internal.openstack-kuttl-tests.svc:8778...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect placement-internal.openstack-kuttl-tests.svc:8778 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local 'endpoint_url=https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo 'https://swift-internal.openstack-kuttl-tests.svc:8080/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! swift-internal.openstack-kuttl-tests.svc:8080 =~ :[0-9]+$ ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking swift-internal.openstack-kuttl-tests.svc:8080 ... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080... logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking swift-internal.openstack-kuttl-tests.svc:8080 ...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer swift-internal.openstack-kuttl-tests.svc:8080...' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect swift-internal.openstack-kuttl-tests.svc:8080 logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:22 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! barbican-internal.openstack-kuttl-tests.svc:9311 =~ :[0-9]+$ ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking barbican-internal.openstack-kuttl-tests.svc:9311 ...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking barbican-internal.openstack-kuttl-tests.svc:9311 ... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer barbican-internal.openstack-kuttl-tests.svc:9311... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect barbican-internal.openstack-kuttl-tests.svc:9311 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://cinder-internal.openstack-kuttl-tests.svc:8776/v3 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! cinder-internal.openstack-kuttl-tests.svc:8776 =~ :[0-9]+$ ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking cinder-internal.openstack-kuttl-tests.svc:8776 ...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking cinder-internal.openstack-kuttl-tests.svc:8776 ... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer cinder-internal.openstack-kuttl-tests.svc:8776... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect cinder-internal.openstack-kuttl-tests.svc:8776 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! glance-default-internal.openstack-kuttl-tests.svc:9292 =~ :[0-9]+$ ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking glance-default-internal.openstack-kuttl-tests.svc:9292 ... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer glance-default-internal.openstack-kuttl-tests.svc:9292... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect glance-default-internal.openstack-kuttl-tests.svc:9292 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ internal == \p\u\b\l\i\c ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+(:[0-9]+)?).*|\1|' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! keystone-internal.openstack-kuttl-tests.svc:5000 =~ :[0-9]+$ ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking keystone-internal.openstack-kuttl-tests.svc:5000 ...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking keystone-internal.openstack-kuttl-tests.svc:5000 ... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000...' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer keystone-internal.openstack-kuttl-tests.svc:5000... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect keystone-internal.openstack-kuttl-tests.svc:5000 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-internal-custom ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-internal-custom != \r\o\o\t\c\a\-\i\n\t\e\r\n\a\l\-\c\u\s\t\o\m ]] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + '[' 1 -eq 1 ']' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'All certificates match the custom issuer rootca-internal-custom' logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + exit 0 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | All certificates match the custom issuer rootca-internal-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | running command: [sh -c echo "Checking issuer of ingress certificates..." oc exec -i openstackclient -n $NAMESPACE -- bash -s < ../../common/osp_check_cert_issuer.sh "rootca-ingress-custom" "public" ] logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking issuer of ingress certificates... logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + EXPECTED_ISSUER=rootca-ingress-custom logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ENDPOINT_TYPE=public logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER_MISMATCHES= logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ALL_MATCHED=1 logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:52:23 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ grep keystone-public logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + keystone_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + keystone_host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + check_keystone_endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ...' logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking Keystone endpoint https://keystone-public-openstack-kuttl-tests.apps-crc.testing ... logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ curl -s -o /dev/null -w '%{http_code}' https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + http_status=300 logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ 300 -ge 200 ]] logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ 300 -lt 400 ]] logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + return 0 logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + endpoint_filter=public logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ openstack endpoint list -c URL -f value logger.go:42: 23:52:25 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ grep public logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local 'endpoint_url=https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo 'https://swift-public-openstack-kuttl-tests.apps-crc.testing/v1/AUTH_%(tenant_id)s' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! swift-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking swift-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer swift-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect swift-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! barbican-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking barbican-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer barbican-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect barbican-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://cinder-public-openstack-kuttl-tests.apps-crc.testing/v3 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! cinder-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking cinder-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer cinder-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect cinder-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! glance-default-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer glance-default-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect glance-default-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://nova-public-openstack-kuttl-tests.apps-crc.testing/v2.1 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! nova-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking nova-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer nova-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect nova-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! keystone-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking keystone-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer keystone-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect keystone-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! placement-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking placement-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer placement-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect placement-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for url in $(openstack endpoint list -c URL -f value | grep "$endpoint_filter") logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ extract_host_port https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local endpoint_url=https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ public == \p\u\b\l\i\c ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ echo https://neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ sed -E 's|^[^:/]+://([^:/]+).*|\1|' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ [[ ! neutron-public-openstack-kuttl-tests.apps-crc.testing =~ :[0-9]+$ ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + for retry in {1..5} logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443...' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Checking neutron-public-openstack-kuttl-tests.apps-crc.testing:443 ... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | Retrying 1 on getting issuer neutron-public-openstack-kuttl-tests.apps-crc.testing:443... logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ get_issuer_cn neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local host_port=neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ local output logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl s_client -connect neutron-public-openstack-kuttl-tests.apps-crc.testing:443 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | +++ openssl x509 -noout -issuer logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ output=issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ echo issuer=CN=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | ++ sed -n 's/^.*CN[[:space:]]*=[[:space:]]*\([^,]*\).*$/\1/p' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + ISSUER=rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ -n rootca-ingress-custom ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + break logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + [[ rootca-ingress-custom != \r\o\o\t\c\a\-\i\n\g\r\e\s\s\-\c\u\s\t\o\m ]] logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + '[' 1 -eq 1 ']' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + echo 'All certificates match the custom issuer rootca-ingress-custom' logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | + exit 0 logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | All certificates match the custom issuer rootca-ingress-custom logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/10-rotate-service-certs | test step completed 10-rotate-service-certs logger.go:42: 23:52:27 | ctlplane-tls-custom-issuers/11-cleanup | starting test step 11-cleanup logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete --ignore-not-found=true -n $NAMESPACE issuer rootca-internal-custom rootca-ingress-custom oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | issuer.cert-manager.io "rootca-internal-custom" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | issuer.cert-manager.io "rootca-ingress-custom" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:52:28 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:52:29 | ctlplane-tls-custom-issuers/11-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:52:35 | ctlplane-tls-custom-issuers/11-cleanup | secret "rootca-internal" deleted logger.go:42: 23:52:35 | ctlplane-tls-custom-issuers/11-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:52:35 | ctlplane-tls-custom-issuers/11-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:52:35 | ctlplane-tls-custom-issuers/11-cleanup | secret "rootca-public" deleted logger.go:42: 23:53:02 | ctlplane-tls-custom-issuers/11-cleanup | test step completed 11-cleanup logger.go:42: 23:53:02 | ctlplane-tls-custom-issuers | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (934.89s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-tls-custom-issuers (933.03s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 15m storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:53:25 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:53:25 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:53:27 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:53:27 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:53:28 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:53:28 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:53:28 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/ctlplane-tls-custom-route === PAUSE kuttl/harness/ctlplane-tls-custom-route === CONT kuttl/harness/ctlplane-tls-custom-route logger.go:42: 23:53:28 | ctlplane-tls-custom-route | Ignoring README.md as it does not match file name regexp: ^(\d+)-(?:[^\.]+)(?:\.yaml)?$ logger.go:42: 23:53:28 | ctlplane-tls-custom-route | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:53:28 | ctlplane-tls-custom-route/1-deploy-openstack | starting test step 1-deploy-openstack logger.go:42: 23:53:28 | ctlplane-tls-custom-route/1-deploy-openstack | running command: [sh -c oc kustomize ../../../../config/samples/base/openstackcontrolplane | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:53:28 | ctlplane-tls-custom-route/1-deploy-openstack | Warning: spec.galera.template[openstack].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:53:28 | ctlplane-tls-custom-route/1-deploy-openstack | Warning: spec.galera.template[openstack-cell1].storageRequest: 500M is not appropriate for production! For production use at least 5G! logger.go:42: 23:53:28 | ctlplane-tls-custom-route/1-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack created logger.go:42: 23:57:13 | ctlplane-tls-custom-route/1-deploy-openstack | test step completed 1-deploy-openstack logger.go:42: 23:57:13 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | starting test step 2-deploy-custom-route-secret logger.go:42: 23:57:13 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | running command: [sh -c source ../../common/create_custom_cert.sh INGRESS_DOMAIN=$(oc get ingresses.config.openshift.io cluster -o jsonpath='{.spec.domain}') create_barbican_placement_routes "${INGRESS_DOMAIN}" "${NAMESPACE}" ] logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating route certificates for barbican and placement... logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Setting up custom certificate infrastructure in namespace openstack-kuttl-tests... logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating self-signed issuer in namespace openstack-kuttl-tests... logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Warning: resource issuers/selfsigned-issuer is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by oc apply. oc apply should only be used on resources created declaratively by either oc create --save-config or oc apply. The missing annotation will be patched automatically. logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/selfsigned-issuer configured logger.go:42: 23:57:14 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'issuer/selfsigned-issuer' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:15 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/selfsigned-issuer condition met logger.go:42: 23:57:15 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Self-signed issuer is ready logger.go:42: 23:57:15 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating custom root CA and issuer: rootca-ingress-custom in namespace openstack-kuttl-tests... logger.go:42: 23:57:15 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/rootca-ingress-custom unchanged logger.go:42: 23:57:15 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'certificate/rootca-ingress-custom' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/rootca-ingress-custom condition met logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Root CA certificate rootca-ingress-custom is ready logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/rootca-ingress-custom created logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'issuer/rootca-ingress-custom' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/rootca-ingress-custom condition met logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Custom issuer rootca-ingress-custom is ready logger.go:42: 23:57:16 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating custom root CA and issuer: rootca-internal-custom in namespace openstack-kuttl-tests... logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/rootca-internal-custom unchanged logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'certificate/rootca-internal-custom' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/rootca-internal-custom condition met logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Root CA certificate rootca-internal-custom is ready logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/rootca-internal-custom created logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'issuer/rootca-internal-custom' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | issuer.cert-manager.io/rootca-internal-custom condition met logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Custom issuer rootca-internal-custom is ready logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Custom certificate infrastructure setup complete logger.go:42: 23:57:17 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating custom route certificate for barbican... logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating wildcard certificate barbican-custom-route-cert for *.apps-crc.testing... logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/barbican-custom-route-cert created logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'certificate/barbican-custom-route-cert' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/barbican-custom-route-cert condition met logger.go:42: 23:57:18 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Wildcard certificate barbican-custom-route-cert is ready logger.go:42: 23:57:20 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating route-compatible secret barbican-custom-route... logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | secret/barbican-custom-route created logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Route certificate secret barbican-custom-route created successfully logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating custom route certificate for placement... logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating wildcard certificate placement-custom-route-cert for *.apps-crc.testing... logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/placement-custom-route-cert created logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for 'certificate/placement-custom-route-cert' in namespace 'openstack-kuttl-tests' to become 'condition=Ready'... logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | certificate.cert-manager.io/placement-custom-route-cert condition met logger.go:42: 23:57:21 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Wildcard certificate placement-custom-route-cert is ready logger.go:42: 23:57:23 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating route-compatible secret placement-custom-route... logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | secret/placement-custom-route created logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Route certificate secret placement-custom-route created successfully logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Route certificates created successfully logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | - barbican-custom-route logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | - placement-custom-route logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | running command: [sh -c # Generate ConfigMap for kustomize from the placement-custom-route secret bash ../../common/prepare_placement_certs.sh ] logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Waiting for placement-custom-route secret to be created... logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Secret placement-custom-route found in namespace openstack-kuttl-tests logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Fetching certificates from placement-custom-route secret and creating ConfigMap... logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | Creating ConfigMap file at: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/common/../../../config/samples/tls/custom_route_cert/placement-cert-data.yaml logger.go:42: 23:57:24 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | configmap/placement-cert-data created logger.go:42: 23:57:25 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | ConfigMap placement-cert-data created at /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/common/../../../config/samples/tls/custom_route_cert/placement-cert-data.yaml and applied to namespace openstack-kuttl-tests logger.go:42: 23:57:25 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | This file will be used by kustomize as a resource logger.go:42: 23:57:25 | ctlplane-tls-custom-route/2-deploy-custom-route-secret | test step completed 2-deploy-custom-route-secret logger.go:42: 23:57:25 | ctlplane-tls-custom-route/3-deploy-openstack | starting test step 3-deploy-openstack logger.go:42: 23:57:25 | ctlplane-tls-custom-route/3-deploy-openstack | running command: [sh -c # Apply OpenStackControlPlane with kustomize (ConfigMap was created in step 02) oc kustomize ../../../../config/samples/tls/custom_route_cert | oc apply -n $NAMESPACE -f - ] logger.go:42: 23:57:25 | ctlplane-tls-custom-route/3-deploy-openstack | configmap/placement-cert-data unchanged logger.go:42: 23:57:25 | ctlplane-tls-custom-route/3-deploy-openstack | openstackcontrolplane.core.openstack.org/openstack configured logger.go:42: 23:58:09 | ctlplane-tls-custom-route/3-deploy-openstack | test step completed 3-deploy-openstack logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | starting test step 4- logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | running command: [sh -c echo "Checking barbican custom route certificate..." bash ../../common/osp_check_route_cert.sh "barbican" ] logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | Checking barbican custom route certificate... logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | TLS data matches for route barbican in namespace openstack-kuttl-tests. logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | running command: [sh -c echo "Checking placement custom route certificate..." bash ../../common/osp_check_route_cert.sh "placement" ] logger.go:42: 23:58:09 | ctlplane-tls-custom-route/4- | Checking placement custom route certificate... logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | TLS data matches for route placement in namespace openstack-kuttl-tests. logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | running command: [sh -c echo "Verifying placement route override certificates in OpenStackControlPlane..." bash ../../common/verify_route_override_certs.sh "placement" ] logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | Verifying placement route override certificates in OpenStackControlPlane... logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | Verifying placement route override certificates... logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | ✓ All certificates match for placement logger.go:42: 23:58:10 | ctlplane-tls-custom-route/4- | test step completed 4- logger.go:42: 23:58:10 | ctlplane-tls-custom-route/5-cleanup | starting test step 5-cleanup logger.go:42: 23:58:11 | ctlplane-tls-custom-route/5-cleanup | running command: [sh -c oc delete --ignore-not-found=true -n $NAMESPACE pvc \ srv-swift-storage-0 oc delete --ignore-not-found=true -n $NAMESPACE issuer rootca-internal-custom rootca-ingress-custom oc delete secret --ignore-not-found=true combined-ca-bundle -n $NAMESPACE oc delete secret -l service-cert -n $NAMESPACE oc delete secret -l ca-cert -n $NAMESPACE ] logger.go:42: 23:58:11 | ctlplane-tls-custom-route/5-cleanup | issuer.cert-manager.io "rootca-internal-custom" deleted logger.go:42: 23:58:11 | ctlplane-tls-custom-route/5-cleanup | issuer.cert-manager.io "rootca-ingress-custom" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "combined-ca-bundle" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-barbican-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-barbican-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-barbican-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-ceilometer-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-cinder-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-cinder-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-cinder-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-galera-openstack-cell1-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-galera-openstack-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-glance-default-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-glance-default-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-glance-default-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-keystone-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-keystone-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-keystone-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-kube-state-metrics-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-memcached-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-neutron-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-neutron-ovndbs" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-neutron-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-neutron-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-internal-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-novncproxy-cell1-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-novncproxy-cell1-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-novncproxy-cell1-vencrypt" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-public-route" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-nova-public-svc" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-ovn-metrics" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-ovndbcluster-nb-ovndbs" deleted logger.go:42: 23:58:12 | ctlplane-tls-custom-route/5-cleanup | secret "cert-ovndbcluster-sb-ovndbs" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-ovnnorthd-ovndbs" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-placement-internal-svc" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-placement-public-route" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-placement-public-svc" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-rabbitmq-cell1-svc" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-rabbitmq-svc" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-swift-internal-svc" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-swift-public-route" deleted logger.go:42: 23:58:13 | ctlplane-tls-custom-route/5-cleanup | secret "cert-swift-public-svc" deleted logger.go:42: 23:58:19 | ctlplane-tls-custom-route/5-cleanup | secret "rootca-internal" deleted logger.go:42: 23:58:19 | ctlplane-tls-custom-route/5-cleanup | secret "rootca-libvirt" deleted logger.go:42: 23:58:19 | ctlplane-tls-custom-route/5-cleanup | secret "rootca-ovn" deleted logger.go:42: 23:58:19 | ctlplane-tls-custom-route/5-cleanup | secret "rootca-public" deleted logger.go:42: 23:58:44 | ctlplane-tls-custom-route/5-cleanup | test step completed 5-cleanup logger.go:42: 23:58:44 | ctlplane-tls-custom-route | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (318.97s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/ctlplane-tls-custom-route (316.64s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/swift-swift-storage-0 ++ cut -d / -f 2 + NAME=swift-swift-storage-0 + oc delete -n openstack-kuttl-tests pvc/swift-swift-storage-0 --ignore-not-found persistentvolumeclaim "swift-swift-storage-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-external-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-external-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-external-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-external-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/glance-glance-default-internal-api-0 ++ cut -d / -f 2 + NAME=glance-glance-default-internal-api-0 + oc delete -n openstack-kuttl-tests pvc/glance-glance-default-internal-api-0 --ignore-not-found persistentvolumeclaim "glance-glance-default-internal-api-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-nb-etc-ovn-ovsdbserver-nb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ cut -d / -f 1 ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-cell1-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-cell1-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-cell1-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-cell1-galera-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 ++ cut -d / -f 2 + NAME=ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 + oc delete -n openstack-kuttl-tests pvc/ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0 --ignore-not-found persistentvolumeclaim "ovndbcluster-sb-etc-ovn-ovsdbserver-sb-0" deleted + for pvc in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | grep Bound | awk '{print $6}'` ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 1 + NS=openstack-kuttl-tests ++ echo openstack-kuttl-tests/mysql-db-openstack-galera-0 ++ cut -d / -f 2 + NAME=mysql-db-openstack-galera-0 + oc delete -n openstack-kuttl-tests pvc/mysql-db-openstack-galera-0 --ignore-not-found persistentvolumeclaim "mysql-db-openstack-galera-0" deleted ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 5m29s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ oc apply -f - ++ cat Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ sed -e 's|node/||' ++ head -c-1 ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:59:09 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:59:09 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:59:09 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:59:09 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:59:10 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:59:10 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:59:10 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-create-test === PAUSE kuttl/harness/dataplane-create-test === CONT kuttl/harness/dataplane-create-test logger.go:42: 23:59:10 | dataplane-create-test | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:59:10 | dataplane-create-test/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 23:59:10 | dataplane-create-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/network-config-template created logger.go:42: 23:59:11 | dataplane-create-test/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/openstack-edpm-ipam created logger.go:42: 23:59:33 | dataplane-create-test/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 23:59:33 | dataplane-create-test | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (23.96s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-create-test (22.29s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 32s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/20 23:59:54 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 23:59:54 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 23:59:55 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 23:59:55 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 23:59:56 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 23:59:56 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 23:59:56 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-deploy-global-service-test === PAUSE kuttl/harness/dataplane-deploy-global-service-test === CONT kuttl/harness/dataplane-deploy-global-service-test logger.go:42: 23:59:56 | dataplane-deploy-global-service-test | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********le created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/ovncontroller-config created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********ey created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | Secret:op**********et updated Warning: unknown field "spec.label" logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/custom-global-service created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/network-config-template created logger.go:42: 23:59:56 | dataplane-deploy-global-service-test/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-global created logger.go:42: 23:59:57 | dataplane-deploy-global-service-test/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 23:59:57 | dataplane-deploy-global-service-test/1-dataplane-deploy | starting test step 1-dataplane-deploy logger.go:42: 23:59:57 | dataplane-deploy-global-service-test/1-dataplane-deploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-global created logger.go:42: 00:02:45 | dataplane-deploy-global-service-test/1-dataplane-deploy | test step completed 1-dataplane-deploy logger.go:42: 00:02:45 | dataplane-deploy-global-service-test/2-add-nodeset | starting test step 2-add-nodeset logger.go:42: 00:02:45 | dataplane-deploy-global-service-test/2-add-nodeset | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-beta-nodeset created logger.go:42: 00:02:45 | dataplane-deploy-global-service-test/2-add-nodeset | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-multinodeset created logger.go:42: 00:04:33 | dataplane-deploy-global-service-test/2-add-nodeset | test step completed 2-add-nodeset logger.go:42: 00:04:33 | dataplane-deploy-global-service-test | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (278.67s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-deploy-global-service-test (277.19s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 4m46s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:04:54 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:04:54 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:04:55 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:04:55 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:04:55 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:04:55 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:04:56 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-deploy-multiple-secrets === PAUSE kuttl/harness/dataplane-deploy-multiple-secrets === CONT kuttl/harness/dataplane-deploy-multiple-secrets logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets | Ignoring certs.yaml as it does not match file name regexp: ^(\d+)-(?:[^\.]+)(?:\.yaml)?$ logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/generic-service1 created logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/install-certs-ovr created logger.go:42: 00:04:56 | dataplane-deploy-multiple-secrets/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/openstack-edpm-tls created logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | starting test step 1-create-cert-issuers logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | running command: [sh -c function wait_for() { timeout=$1 shift 1 until [ $timeout -le 0 ] || ("$@" &> /dev/null); do echo waiting for "$@" sleep 1 timeout=$(( timeout - 1 )) done if [ $timeout -le 0 ]; then return 1 fi } if oc get secret combined-ca-bundle -n openstack-kuttl-tests; then oc delete secret combined-ca-bundle -n openstack-kuttl-tests; fi oc apply -f ./certs.yaml wait_for 100 oc get secret osp-rootca-secret -n openstack-kuttl-tests CA_CRT=$(oc get secret osp-rootca-secret -n openstack-kuttl-tests -o json|jq -r '.data."ca.crt"') oc create secret generic combined-ca-bundle -n openstack-kuttl-tests --from-literal=TLSCABundleFile=$CA_CRT ] logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | Error from server (NotFound): secrets "combined-ca-bundle" not found logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | issuer.cert-manager.io/selfsigned-issuer created logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | certificate.cert-manager.io/osp-rootca created logger.go:42: 00:05:07 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | issuer.cert-manager.io/rootca-internal created logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | secret/combined-ca-bundle created logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/1-create-cert-issuers | test step completed 1-create-cert-issuers logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | starting test step 2-dataplane-deploy Warning: unknown field "spec.services" logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/openstack-edpm-tls created logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | Error from server (NotFound): secrets "cert-generic-service1-default-edpm-compute-0" not found logger.go:42: 00:05:08 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | bad match: logger.go:42: 00:05:09 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:09 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | Error from server (NotFound): secrets "cert-generic-service1-default-edpm-compute-0" not found logger.go:42: 00:05:09 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | bad match: logger.go:42: 00:05:10 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:11 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:13 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:14 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:15 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:16 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:18 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:19 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:20 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:21 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:23 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:24 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:25 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:26 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | running command: [sh -c template='{{index .metadata.annotations "cert-manager.io/alt-names" }}' names=$(oc get secret cert-generic-service1-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:05:26 | dataplane-deploy-multiple-secrets/2-dataplane-deploy | test step completed 2-dataplane-deploy logger.go:42: 00:05:26 | dataplane-deploy-multiple-secrets | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (32.45s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-deploy-multiple-secrets (30.79s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 40s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:05:49 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:05:49 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:05:49 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:05:49 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:05:50 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:05:50 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:05:50 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-deploy-no-nodes-test === PAUSE kuttl/harness/dataplane-deploy-no-nodes-test === CONT kuttl/harness/dataplane-deploy-no-nodes-test logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/ovncontroller-config created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ig created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********ey created logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | Secret:op**********et updated logger.go:42: 00:05:50 | dataplane-deploy-no-nodes-test/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:06:01 | dataplane-deploy-no-nodes-test/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:06:01 | dataplane-deploy-no-nodes-test/1-dataplane-deploy | starting test step 1-dataplane-deploy logger.go:42: 00:06:01 | dataplane-deploy-no-nodes-test/1-dataplane-deploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/1-dataplane-deploy | test step completed 1-dataplane-deploy logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/2-dataplane-deploy-services-override | starting test step 2-dataplane-deploy-services-override Warning: unknown field "spec.label" logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/2-dataplane-deploy-services-override | OpenStackDataPlaneService:openstack-kuttl-tests/custom-svc created logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/2-dataplane-deploy-services-override | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes-ovrd created logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/2-dataplane-deploy-services-override | test step completed 2-dataplane-deploy-services-override logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/3-update-ovn-cm | starting test step 3-update-ovn-cm logger.go:42: 00:07:24 | dataplane-deploy-no-nodes-test/3-update-ovn-cm | running command: [sh -c sleep 30] logger.go:42: 00:07:54 | dataplane-deploy-no-nodes-test/3-update-ovn-cm | ConfigMap:openstack-kuttl-tests/ovncontroller-config updated logger.go:42: 00:07:54 | dataplane-deploy-no-nodes-test/3-update-ovn-cm | test step completed 3-update-ovn-cm logger.go:42: 00:07:54 | dataplane-deploy-no-nodes-test/4-dataplane-deploy | starting test step 4-dataplane-deploy logger.go:42: 00:07:54 | dataplane-deploy-no-nodes-test/4-dataplane-deploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes-updated-ovn-cm created logger.go:42: 00:08:00 | dataplane-deploy-no-nodes-test/4-dataplane-deploy | test step completed 4-dataplane-deploy logger.go:42: 00:08:00 | dataplane-deploy-no-nodes-test/5-dataplane-deploy-service-not-found | starting test step 5-dataplane-deploy-service-not-found logger.go:42: 00:08:00 | dataplane-deploy-no-nodes-test/5-dataplane-deploy-service-not-found | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes-non-existent-service created logger.go:42: 00:08:02 | dataplane-deploy-no-nodes-test/5-dataplane-deploy-service-not-found | test step completed 5-dataplane-deploy-service-not-found logger.go:42: 00:08:02 | dataplane-deploy-no-nodes-test/6-add-nodeset | starting test step 6-add-nodeset logger.go:42: 00:08:03 | dataplane-deploy-no-nodes-test/6-add-nodeset | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-beta-nodeset created logger.go:42: 00:08:03 | dataplane-deploy-no-nodes-test/6-add-nodeset | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-multinodeset created logger.go:42: 00:09:58 | dataplane-deploy-no-nodes-test/6-add-nodeset | test step completed 6-add-nodeset logger.go:42: 00:09:58 | dataplane-deploy-no-nodes-test/7-dataplane-deploy-node-selector | starting test step 7-dataplane-deploy-node-selector logger.go:42: 00:09:58 | dataplane-deploy-no-nodes-test/7-dataplane-deploy-node-selector | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-node-selection created logger.go:42: 00:09:59 | dataplane-deploy-no-nodes-test/7-dataplane-deploy-node-selector | test step completed 7-dataplane-deploy-node-selector logger.go:42: 00:09:59 | dataplane-deploy-no-nodes-test | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (250.50s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-deploy-no-nodes-test (248.99s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 4m19s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ oc apply -f - ++ cat rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:10:32 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:10:32 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:10:33 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:10:33 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:10:34 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:10:34 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:10:34 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-deploy-tls-test === PAUSE kuttl/harness/dataplane-deploy-tls-test === CONT kuttl/harness/dataplane-deploy-tls-test logger.go:42: 00:10:34 | dataplane-deploy-tls-test | Ignoring certs.yaml as it does not match file name regexp: ^(\d+)-(?:[^\.]+)(?:\.yaml)?$ logger.go:42: 00:10:34 | dataplane-deploy-tls-test | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:10:34 | dataplane-deploy-tls-test/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 00:10:34 | dataplane-deploy-tls-test/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/tls-dnsnames created logger.go:42: 00:10:34 | dataplane-deploy-tls-test/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/install-certs-ovrd created logger.go:42: 00:10:34 | dataplane-deploy-tls-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/network-config-template created logger.go:42: 00:10:34 | dataplane-deploy-tls-test/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/openstack-edpm-tls created logger.go:42: 00:10:55 | dataplane-deploy-tls-test/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:10:55 | dataplane-deploy-tls-test/1-create-cert-issuers | starting test step 1-create-cert-issuers logger.go:42: 00:10:55 | dataplane-deploy-tls-test/1-create-cert-issuers | running command: [sh -c function wait_for() { timeout=$1 shift 1 until [ $timeout -le 0 ] || ("$@" &> /dev/null); do echo waiting for "$@" sleep 1 timeout=$(( timeout - 1 )) done if [ $timeout -le 0 ]; then return 1 fi } if oc get secret combined-ca-bundle -n openstack-kuttl-tests; then oc delete secret combined-ca-bundle -n openstack-kuttl-tests; fi oc apply -f ./certs.yaml wait_for 100 oc get secret osp-rootca-secret -n openstack-kuttl-tests CA_CRT=$(oc get secret osp-rootca-secret -n openstack-kuttl-tests -o json|jq -r '.data."ca.crt"') oc create secret generic combined-ca-bundle -n openstack-kuttl-tests --from-literal=tls-ca-bundle.pem=$CA_CRT ] logger.go:42: 00:10:55 | dataplane-deploy-tls-test/1-create-cert-issuers | NAME TYPE DATA AGE logger.go:42: 00:10:55 | dataplane-deploy-tls-test/1-create-cert-issuers | combined-ca-bundle Opaque 1 5m47s logger.go:42: 00:10:56 | dataplane-deploy-tls-test/1-create-cert-issuers | secret "combined-ca-bundle" deleted logger.go:42: 00:10:56 | dataplane-deploy-tls-test/1-create-cert-issuers | issuer.cert-manager.io/selfsigned-issuer unchanged logger.go:42: 00:10:56 | dataplane-deploy-tls-test/1-create-cert-issuers | certificate.cert-manager.io/osp-rootca unchanged logger.go:42: 00:10:56 | dataplane-deploy-tls-test/1-create-cert-issuers | issuer.cert-manager.io/rootca-internal unchanged logger.go:42: 00:10:57 | dataplane-deploy-tls-test/1-create-cert-issuers | secret/combined-ca-bundle created logger.go:42: 00:10:57 | dataplane-deploy-tls-test/1-create-cert-issuers | test step completed 1-create-cert-issuers logger.go:42: 00:10:57 | dataplane-deploy-tls-test/2-dataplane-deploy | starting test step 2-dataplane-deploy logger.go:42: 00:10:57 | dataplane-deploy-tls-test/2-dataplane-deploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/openstack-edpm-tls created logger.go:42: 00:10:57 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:10:57 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:10:58 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:10:58 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:10:59 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:00 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:01 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:01 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:02 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:02 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:03 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:04 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:05 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:05 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:06 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:06 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:07 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:08 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:09 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:09 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:10 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:10 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:12 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:12 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:13 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:13 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:14 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:14 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:16 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:16 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:17 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:17 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:19 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:19 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:20 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:20 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:21 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:21 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:23 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:23 | dataplane-deploy-tls-test/2-dataplane-deploy | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate tls-dnsnames-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:23 | dataplane-deploy-tls-test/2-dataplane-deploy | test step completed 2-dataplane-deploy logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | starting test step 3-dataplane-deploy-services-override logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | OpenStackDataPlaneService:openstack-kuttl-tests/tls-dns-ips created logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | OpenStackDataPlaneService:openstack-kuttl-tests/custom-tls-dns created logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | OpenStackDataPlaneService:openstack-kuttl-tests/install-certs-ovrd updated logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | OpenStackDataPlaneDeployment:openstack-kuttl-tests/openstack-edpm-tls-ovrd created logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | Error from server (NotFound): certificates.cert-manager.io "custom-tls-dns-default-edpm-compute-0" not found logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | bad dnsnames match: logger.go:42: 00:11:23 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | command failure, skipping 1 additional commands logger.go:42: 00:11:24 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:24 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:26 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:26 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:27 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:27 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:28 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:28 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:30 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:30 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:31 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:31 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:32 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:32 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:34 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:34 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:35 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:35 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:36 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:37 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:38 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:38 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:39 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:39 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:40 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:41 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:42 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:42 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:43 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:43 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:44 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:45 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:46 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:46 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:47 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:47 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:48 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.dnsNames }}' names=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $names > test123.data regex="(?=.*(edpm-compute-0\.internalapi\.example\.com))(?=.*(edpm-compute-0\.storage\.example\.com))(?=.*(edpm-compute-0\.tenant\.example\.com))(?=.*(edpm-compute-0\.ctlplane\.example\.com))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad dnsnames match: $names" exit 1 else exit 0 fi ] logger.go:42: 00:11:49 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | running command: [sh -c template='{{index .spec.usages }}' usages=$(oc get certificate custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o go-template="$template") echo $usages > test123.data regex="(?=.*(key encipherment))(?=.*(digital signature))(?=.*(server auth))(?=.*(client auth))" matches=$(grep -P "$regex" test123.data) rm test123.data if [ -z "$matches" ]; then echo "bad usages match: $usages" exit 1 else exit 0 fi ] logger.go:42: 00:11:49 | dataplane-deploy-tls-test/3-dataplane-deploy-services-override | test step completed 3-dataplane-deploy-services-override logger.go:42: 00:11:49 | dataplane-deploy-tls-test/4-rotate-certs | starting test step 4-rotate-certs logger.go:42: 00:11:49 | dataplane-deploy-tls-test/4-rotate-certs | running command: [oc delete -n openstack-kuttl-tests secrets cert-custom-tls-dns-default-edpm-compute-0 cert-tls-dns-ips-default-edpm-compute-0] logger.go:42: 00:11:49 | dataplane-deploy-tls-test/4-rotate-certs | secret "cert-custom-tls-dns-default-edpm-compute-0" deleted logger.go:42: 00:11:49 | dataplane-deploy-tls-test/4-rotate-certs | secret "cert-tls-dns-ips-default-edpm-compute-0" deleted logger.go:42: 00:11:49 | dataplane-deploy-tls-test/4-rotate-certs | test step completed 4-rotate-certs logger.go:42: 00:11:49 | dataplane-deploy-tls-test/5-dataplane-redeploy | starting test step 5-dataplane-redeploy logger.go:42: 00:11:49 | dataplane-deploy-tls-test/5-dataplane-redeploy | OpenStackDataPlaneDeployment:openstack-kuttl-tests/certs-refresh created logger.go:42: 00:11:49 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:49 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:49 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:50 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:50 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:50 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:51 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:51 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:51 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:52 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:52 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:52 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:53 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:54 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:54 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:55 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:55 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:55 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:56 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:56 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:56 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:57 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:57 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:11:57 | dataplane-deploy-tls-test/5-dataplane-redeploy | Waiting for successful ansibleee pod logger.go:42: 00:11:58 | dataplane-deploy-tls-test/5-dataplane-redeploy | running command: [sh -c PNAME=`oc get pod -l job-name=install-certs-ovrd-certs-refresh-openstack-edpm-tls --field-selector status.phase=Succeeded -n openstack-kuttl-tests -o name` echo $PNAME if [ -z "$PNAME" ]; then echo "Waiting for successful ansibleee pod" exit 1 fi serial1=`oc get secret cert-custom-tls-dns-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/custom-tls-dns/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-custom-tls-dns-default-edpm-compute-0 not equal" exit 1 fi serial1=`oc get secret cert-tls-dns-ips-default-edpm-compute-0 -n openstack-kuttl-tests -o json|jq -r '.data."tls.crt"'|base64 -d |openssl x509 -noout -serial` echo "serial1:" $serial1 serial2=`oc debug $PNAME -n openstack-kuttl-tests -- cat /var/lib/openstack/certs/tls-dns-ips/default/edpm-compute-0.ctlplane.example.com-tls.crt |openssl x509 -noout -serial` echo "serial2:" $serial2 if [ $serial1 != $serial2 ]; then echo "serials for cert-tls-dns-ips-default-edpm-compute-0 not equal" exit 1 fi exit 0 ] logger.go:42: 00:11:58 | dataplane-deploy-tls-test/5-dataplane-redeploy | pod/install-certs-ovrd-certs-refresh-openstack-edpm-tls-mkxmg logger.go:42: 00:11:58 | dataplane-deploy-tls-test/5-dataplane-redeploy | serial1: serial=1137D9339732817E7172214717F53BBF logger.go:42: 00:11:59 | dataplane-deploy-tls-test/5-dataplane-redeploy | Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] logger.go:42: 00:11:59 | dataplane-deploy-tls-test/5-dataplane-redeploy | Starting pod/install-certs-ovrd-certs-refresh-openstack-edpm-tls-mkxmg-debug-w7lcp ... logger.go:42: 00:12:02 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:12:02 | dataplane-deploy-tls-test/5-dataplane-redeploy | Removing debug pod ... logger.go:42: 00:12:02 | dataplane-deploy-tls-test/5-dataplane-redeploy | serial2: serial=1137D9339732817E7172214717F53BBF logger.go:42: 00:12:03 | dataplane-deploy-tls-test/5-dataplane-redeploy | serial1: serial=23F3B86288E90D8BD22A02554F118265 logger.go:42: 00:12:03 | dataplane-deploy-tls-test/5-dataplane-redeploy | Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] logger.go:42: 00:12:03 | dataplane-deploy-tls-test/5-dataplane-redeploy | Starting pod/install-certs-ovrd-certs-refresh-openstack-edpm-tls-mkxmg-debug-79svm ... logger.go:42: 00:12:05 | dataplane-deploy-tls-test/5-dataplane-redeploy | logger.go:42: 00:12:05 | dataplane-deploy-tls-test/5-dataplane-redeploy | Removing debug pod ... logger.go:42: 00:12:05 | dataplane-deploy-tls-test/5-dataplane-redeploy | serial2: serial=23F3B86288E90D8BD22A02554F118265 logger.go:42: 00:12:05 | dataplane-deploy-tls-test/5-dataplane-redeploy | test step completed 5-dataplane-redeploy logger.go:42: 00:12:05 | dataplane-deploy-tls-test | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (93.28s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-deploy-tls-test (91.67s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 101s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ oc apply -f - ++ cat serviceaccount/crc-storage unchanged ++ oc apply -f - ++ cat role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:12:29 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:12:29 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:12:30 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:12:30 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:12:31 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:12:31 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:12:31 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-extramounts === PAUSE kuttl/harness/dataplane-extramounts === CONT kuttl/harness/dataplane-extramounts logger.go:42: 00:12:31 | dataplane-extramounts | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:12:31 | dataplane-extramounts/0-dataplane-create | starting test step 0-dataplane-create Warning: unknown field "spec.label" logger.go:42: 00:12:31 | dataplane-extramounts/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/test-service created logger.go:42: 00:12:31 | dataplane-extramounts/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-extramounts created logger.go:42: 00:12:31 | dataplane-extramounts/0-dataplane-create | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-extramounts created logger.go:42: 00:12:46 | dataplane-extramounts/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:12:46 | dataplane-extramounts | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (16.73s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-extramounts (15.23s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 24s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ tr '\n' ' ' ++ head -c-1 ++ sed -e 's|node/||' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:13:13 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:13:13 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:13:14 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:13:14 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:13:14 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:13:14 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:13:15 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-multinode-nodeset-create-test === PAUSE kuttl/harness/dataplane-multinode-nodeset-create-test === CONT kuttl/harness/dataplane-multinode-nodeset-create-test logger.go:42: 00:13:15 | dataplane-multinode-nodeset-create-test | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:13:15 | dataplane-multinode-nodeset-create-test/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 00:13:15 | dataplane-multinode-nodeset-create-test/0-dataplane-create | ConfigMap:openstack-kuttl-tests/network-config-template created logger.go:42: 00:13:15 | dataplane-multinode-nodeset-create-test/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/openstack-edpm-multinode created logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/1-dataplane-scale-in | starting test step 1-dataplane-scale-in logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/1-dataplane-scale-in | running command: [sh -c oc patch openstackdataplanenodeset/openstack-edpm-multinode -n openstack-kuttl-tests --type json --patch '[{ "op": "remove", "path": "/spec/nodes/edpm-compute-1" }]' ] logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/1-dataplane-scale-in | openstackdataplanenodeset.dataplane.openstack.org/openstack-edpm-multinode patched logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/1-dataplane-scale-in | test step completed 1-dataplane-scale-in logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/2-dataplane-scale-out | starting test step 2-dataplane-scale-out logger.go:42: 00:13:31 | dataplane-multinode-nodeset-create-test/2-dataplane-scale-out | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/openstack-edpm-multinode updated logger.go:42: 00:13:53 | dataplane-multinode-nodeset-create-test/2-dataplane-scale-out | test step completed 2-dataplane-scale-out logger.go:42: 00:13:53 | dataplane-multinode-nodeset-create-test | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (39.45s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-multinode-nodeset-create-test (37.94s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 47s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ oc apply -f - ++ cat configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ tr '\n' ' ' ++ sed -e 's|node/||' ++ head -c-1 + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:14:15 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:14:15 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:14:15 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:14:15 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:14:16 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:14:16 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:14:16 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-service-config === PAUSE kuttl/harness/dataplane-service-config === CONT kuttl/harness/dataplane-service-config logger.go:42: 00:14:16 | dataplane-service-config | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:14:16 | dataplane-service-config/0-create | starting test step 0-create logger.go:42: 00:14:16 | dataplane-service-config/0-create | ConfigMap:openstack-kuttl-tests/kuttl-service-cm-0 created logger.go:42: 00:14:16 | dataplane-service-config/0-create | ConfigMap:openstack-kuttl-tests/kuttl-service-cm-1 created logger.go:42: 00:14:16 | dataplane-service-config/0-create | ConfigMap:openstack-kuttl-tests/kuttl-service-cm-2 created logger.go:42: 00:14:16 | dataplane-service-config/0-create | OpenStackDataPlaneService:openstack-kuttl-tests/kuttl-service created logger.go:42: 00:14:16 | dataplane-service-config/0-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:14:16 | dataplane-service-config/0-create | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:14:35 | dataplane-service-config/0-create | test step completed 0-create logger.go:42: 00:14:35 | dataplane-service-config | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (20.72s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-service-config (19.21s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 28s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ oc apply -f - ++ cat serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:14:56 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:14:56 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:14:57 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:14:57 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:14:57 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:14:57 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:14:58 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-service-custom-image === PAUSE kuttl/harness/dataplane-service-custom-image === CONT kuttl/harness/dataplane-service-custom-image logger.go:42: 00:14:58 | dataplane-service-custom-image | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:14:58 | dataplane-service-custom-image/0-dataplane-create | starting test step 0-dataplane-create logger.go:42: 00:14:58 | dataplane-service-custom-image/0-dataplane-create | OpenStackDataPlaneService:openstack-kuttl-tests/custom-img-svc created logger.go:42: 00:14:58 | dataplane-service-custom-image/0-dataplane-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-no-nodes-custom-svc created logger.go:42: 00:14:58 | dataplane-service-custom-image/0-dataplane-create | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:15:13 | dataplane-service-custom-image/0-dataplane-create | test step completed 0-dataplane-create logger.go:42: 00:15:13 | dataplane-service-custom-image | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (16.69s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-service-custom-image (15.23s) PASS No resources found make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage_cleanup.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/cleanup-crc-pv.sh ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $6}' ++ grep Bound ++ oc get pv --selector provisioned-by=crc-devsetup --no-headers ++ awk '{print $1}' + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage01-crc persistentvolume "local-storage01-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage02-crc persistentvolume "local-storage02-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage03-crc persistentvolume "local-storage03-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage04-crc persistentvolume "local-storage04-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage05-crc persistentvolume "local-storage05-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage06-crc persistentvolume "local-storage06-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage07-crc persistentvolume "local-storage07-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage08-crc persistentvolume "local-storage08-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage09-crc persistentvolume "local-storage09-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage10-crc persistentvolume "local-storage10-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage11-crc persistentvolume "local-storage11-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage12-crc persistentvolume "local-storage12-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage13-crc persistentvolume "local-storage13-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage14-crc persistentvolume "local-storage14-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage15-crc persistentvolume "local-storage15-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage16-crc persistentvolume "local-storage16-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage17-crc persistentvolume "local-storage17-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage18-crc persistentvolume "local-storage18-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage19-crc persistentvolume "local-storage19-crc" deleted + for pv in `oc get pv --selector provisioned-by=crc-devsetup --no-headers | awk '{print $1}'` + oc delete pv/local-storage20-crc persistentvolume "local-storage20-crc" deleted if oc get sc "local-storage"; then oc delete sc "local-storage"; fi NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE local-storage kubernetes.io/no-provisioner Delete WaitForFirstConsumer true 24s storageclass.storage.k8s.io "local-storage" deleted bash scripts/delete-pv.sh +++ dirname scripts/delete-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ oc apply -f - ++ cat configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ cat ++ oc apply -f - rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc delete ++ set -ex ++ NODE=crc ++ OPERATION=delete ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/retry_make_crc_storage.sh 3 make[3]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z crc-storage ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/crc-storage + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc-storage ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc-storage/namespace.yaml namespace/crc-storage unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io crc-storage); do sleep 1; done" NAME DISPLAY NAME STATUS crc-storage Active oc project crc-storage Already on project "crc-storage" on server "https://api.crc.testing:6443". bash scripts/create-pv.sh +++ dirname scripts/create-pv.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_common.sh ++ set -ex ++ OPERATION=create ++ cat ++ oc apply -f - configmap/crc-storage unchanged ++ cat ++ oc apply -f - serviceaccount/crc-storage unchanged ++ cat ++ oc apply -f - role.rbac.authorization.k8s.io/crc-storage-role unchanged ++ oc apply -f - ++ cat rolebinding.rbac.authorization.k8s.io/crc-storage-rolebinding unchanged + PV_NUM=20 + TIMEOUT=500s ++ oc get pv -o json ++ jq -r '.items[] | select(.status.phase | test("Released")).metadata.name' + released= ++ oc get node -o template --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' -l node-role.kubernetes.io/worker + NODE_NAMES=crc + '[' -z crc ']' + for node in $NODE_NAMES + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/storage_apply.sh crc create ++ set -ex ++ NODE=crc ++ OPERATION=create ++ oc delete -n crc-storage job crc-storage-crc --ignore-not-found job.batch "crc-storage-crc" deleted ++ cat ++ oc apply -f - Warning: would violate PodSecurity "restricted:latest": privileged (container "storage" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "storage" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "storage" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volume "node-mnt" uses restricted volume type "hostPath"), runAsNonRoot != true (pod or container "storage" must set securityContext.runAsNonRoot=true), runAsUser=0 (pod and container "storage" must not set runAsUser=0) job.batch/crc-storage-crc created + oc wait job -n crc-storage -l install-yamls.crc.storage --for condition=Complete --timeout 500s job.batch/crc-storage-crc condition met bash scripts/gen-crc-pv-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z '"local-storage"' ']' + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/crc ']' + PV_NUM=20 + STORAGE_CAPACITY=10 ++ oc get node -o name -l node-role.kubernetes.io/worker ++ head -c-1 ++ sed -e 's|node/||' ++ tr '\n' ' ' + NODE_NAMES=crc + '[' -z crc ']' + cat + for node in $NODE_NAMES ++ seq -w 20 + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + for i in `seq -w $PV_NUM` + cat ++ sed -e 's/^"//' -e 's/"$//' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/crc/storage.yaml storageclass.storage.k8s.io/local-storage created persistentvolume/local-storage01-crc created persistentvolume/local-storage02-crc created persistentvolume/local-storage03-crc created persistentvolume/local-storage04-crc created persistentvolume/local-storage05-crc created persistentvolume/local-storage06-crc created persistentvolume/local-storage07-crc created persistentvolume/local-storage08-crc created persistentvolume/local-storage09-crc created persistentvolume/local-storage10-crc created persistentvolume/local-storage11-crc created persistentvolume/local-storage12-crc created persistentvolume/local-storage13-crc created persistentvolume/local-storage14-crc created persistentvolume/local-storage15-crc created persistentvolume/local-storage16-crc created persistentvolume/local-storage17-crc created persistentvolume/local-storage18-crc created persistentvolume/local-storage19-crc created persistentvolume/local-storage20-crc created persistentvolumeclaim/ansible-ee-logs unchanged make[3]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make[2]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' 2026/01/21 00:15:34 kutt-test config testdirs is overridden with args: [ /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests ] === RUN kuttl harness.go:463: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://api.crc.testing:6443 logger.go:42: 00:15:34 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_netconfig.yaml] logger.go:42: 00:15:34 | | netconfig.network.openstack.org/netconfig configured logger.go:42: 00:15:34 | | running command: [oc apply -n openstack-kuttl-tests -f https://raw.githubusercontent.com/openstack-k8s-operators/infra-operator/main/config/samples/network_v1beta1_dnsmasq.yaml] logger.go:42: 00:15:35 | | dnsmasq.network.openstack.org/dnsmasq configured logger.go:42: 00:15:35 | | running command: [sh -c if [ ! -f ansibleee-ssh-key-id_rsa ]; then ssh-keygen -f ansibleee-ssh-key-id_rsa -N "" -t rsa -b 4096 fi oc create secret generic dataplane-ansible-ssh-private-key-secret \ --save-config \ --dry-run=client \ --from-file=authorized_keys=ansibleee-ssh-key-id_rsa.pub \ --from-file=ssh-privatekey=an**********sa \ --from-file=ssh-publickey=ansibleee-ssh-key-id_rsa.pub \ -n openstack-kuttl-tests \ -o yaml | \ oc apply -f - ] logger.go:42: 00:15:35 | | secret/dataplane-ansible-ssh-private-key-secret configured harness.go:363: running tests harness.go:75: going to run test suite with timeout of 1380 seconds for each step harness.go:375: testsuite: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests has 18 tests === RUN kuttl/harness === RUN kuttl/harness/dataplane-service-failure === PAUSE kuttl/harness/dataplane-service-failure === CONT kuttl/harness/dataplane-service-failure logger.go:42: 00:15:35 | dataplane-service-failure | Skipping creation of user-supplied namespace: openstack-kuttl-tests logger.go:42: 00:15:35 | dataplane-service-failure/0-create | starting test step 0-create logger.go:42: 00:15:35 | dataplane-service-failure/0-create | OpenStackDataPlaneService:openstack-kuttl-tests/failed-service created logger.go:42: 00:15:35 | dataplane-service-failure/0-create | OpenStackDataPlaneNodeSet:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:15:35 | dataplane-service-failure/0-create | OpenStackDataPlaneDeployment:openstack-kuttl-tests/edpm-compute-no-nodes created logger.go:42: 00:17:14 | dataplane-service-failure/0-create | test step completed 0-create logger.go:42: 00:17:14 | dataplane-service-failure | skipping kubernetes event logging === NAME kuttl harness.go:406: run tests finished harness.go:514: cleaning up harness.go:571: removing temp folder: "" --- PASS: kuttl (100.50s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/dataplane-service-failure (99.01s) PASS make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make openstack_deploy_cleanup make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack-kuttl-tests ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/namespace.yaml namespace/openstack-kuttl-tests unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack-kuttl-tests); do sleep 1; done" NAME DISPLAY NAME STATUS openstack-kuttl-tests Active oc project openstack-kuttl-tests Now using project "openstack-kuttl-tests" on server "https://api.crc.testing:6443". oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/infra/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr | oc delete --ignore-not-found=true -f - || true rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-kuttl-tests/openstack/cr make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' make openstack_cleanup make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack-operators ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack-operators + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/namespace.yaml namespace/openstack-operators unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack-operators); do sleep 1; done" NAME DISPLAY NAME STATUS openstack-operators Active oc project openstack-operators Now using project "openstack-operators" on server "https://api.crc.testing:6443". rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op # TODO: Once https://issues.redhat.com/browse/OSPRH-13217 is properly resolved, the # explicit calls to "oc delete" the webhooks can be removed below if oc get openstack &>/dev/null; then oc delete --ignore-not-found=true openstack/openstack \ && oc delete mutatingwebhookconfiguration -l app.kubernetes.io/created-by=openstack-operator \ && oc delete validatingwebhookconfiguration -l app.kubernetes.io/created-by=openstack-operator; fi openstack.operator.openstack.org "openstack" deleted No resources found No resources found oc delete subscription --all=true subscription.operators.coreos.com "openstack-operator" deleted oc delete csv --all=true clusterserviceversion.operators.coreos.com "cluster-observability-operator.v1.3.1" deleted clusterserviceversion.operators.coreos.com "metallb-operator.v4.18.0-202601071645" deleted clusterserviceversion.operators.coreos.com "openstack-operator.v0.5.0" deleted oc delete catalogsource --all=true catalogsource.operators.coreos.com "openstack-operator-index" deleted # Hack to avoid usage of old cached catalog versions when we deploy the operator again oc delete pods -n openshift-operator-lifecycle-manager -l app=catalog-operator pod "catalog-operator-68c6474976-pxvmq" deleted test -d /home/zuul/ci-framework-data/artifacts/manifests/operator/baremetal-operator && make crc_bmo_cleanup || true make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' ~/ci-framework-data/artifacts