2025-12-01 06:51:39,372 p=31389 u=zuul n=ansible | Starting galaxy collection install process 2025-12-01 06:51:39,373 p=31389 u=zuul n=ansible | Process install dependency map 2025-12-01 06:51:53,142 p=31389 u=zuul n=ansible | Starting collection install process 2025-12-01 06:51:53,142 p=31389 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+ab9ad21d' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-12-01 06:51:53,575 p=31389 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+ab9ad21d at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-12-01 06:51:53,575 p=31389 u=zuul n=ansible | cifmw.general:1.0.0+ab9ad21d was installed successfully 2025-12-01 06:51:53,575 p=31389 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-12-01 06:51:53,625 p=31389 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-12-01 06:51:53,625 p=31389 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-12-01 06:51:53,625 p=31389 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-12-01 06:51:54,267 p=31389 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-12-01 06:51:54,267 p=31389 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-12-01 06:51:54,267 p=31389 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-12-01 06:51:54,311 p=31389 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-12-01 06:51:54,311 p=31389 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-12-01 06:51:54,311 p=31389 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-12-01 06:51:54,396 p=31389 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-12-01 06:51:54,396 p=31389 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-12-01 06:51:54,396 p=31389 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-12-01 06:51:54,417 p=31389 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-12-01 06:51:54,417 p=31389 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-12-01 06:51:54,417 p=31389 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-12-01 06:51:54,540 p=31389 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-12-01 06:51:54,540 p=31389 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-12-01 06:51:54,540 p=31389 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-12-01 06:51:54,643 p=31389 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-12-01 06:51:54,643 p=31389 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-12-01 06:51:54,643 p=31389 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-12-01 06:51:54,703 p=31389 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-12-01 06:51:54,703 p=31389 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-12-01 06:51:54,703 p=31389 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-12-01 06:51:54,719 p=31389 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-12-01 06:51:54,719 p=31389 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-12-01 06:51:54,719 p=31389 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-12-01 06:51:54,921 p=31389 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-12-01 06:51:54,921 p=31389 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-12-01 06:51:54,921 p=31389 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-12-01 06:51:55,143 p=31389 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-12-01 06:51:55,143 p=31389 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-12-01 06:51:55,143 p=31389 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-12-01 06:51:55,172 p=31389 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-12-01 06:51:55,172 p=31389 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-12-01 06:51:55,172 p=31389 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-12-01 06:51:55,197 p=31389 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-12-01 06:51:55,197 p=31389 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-12-01 06:51:55,197 p=31389 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-12-01 06:51:55,274 p=31389 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-12-01 06:51:55,274 p=31389 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-12-01 06:52:02,500 p=32065 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-12-01 06:52:02,518 p=32065 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-12-01 06:52:02,518 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:02 +0000 (0:00:00.033) 0:00:00.033 ******* 2025-12-01 06:52:02,518 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:02 +0000 (0:00:00.032) 0:00:00.032 ******* 2025-12-01 06:52:03,360 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:03,373 p=32065 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-12-01 06:52:03,374 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.855) 0:00:00.889 ******* 2025-12-01 06:52:03,374 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.855) 0:00:00.888 ******* 2025-12-01 06:52:03,629 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:03,634 p=32065 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-12-01 06:52:03,634 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.260) 0:00:01.149 ******* 2025-12-01 06:52:03,634 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.260) 0:00:01.148 ******* 2025-12-01 06:52:03,648 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-12-01 06:52:03,689 p=32065 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-12-01 06:52:03,689 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.055) 0:00:01.204 ******* 2025-12-01 06:52:03,689 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.055) 0:00:01.203 ******* 2025-12-01 06:52:03,708 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:03,714 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-01 06:52:03,714 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.024) 0:00:01.229 ******* 2025-12-01 06:52:03,714 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.024) 0:00:01.228 ******* 2025-12-01 06:52:03,735 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:03,740 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-12-01 06:52:03,740 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.026) 0:00:01.255 ******* 2025-12-01 06:52:03,740 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.026) 0:00:01.254 ******* 2025-12-01 06:52:03,787 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:03,792 p=32065 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-12-01 06:52:03,792 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.052) 0:00:01.308 ******* 2025-12-01 06:52:03,792 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.052) 0:00:01.306 ******* 2025-12-01 06:52:03,959 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:03,964 p=32065 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-12-01 06:52:03,964 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.171) 0:00:01.480 ******* 2025-12-01 06:52:03,964 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.171) 0:00:01.478 ******* 2025-12-01 06:52:03,980 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:03,986 p=32065 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-12-01 06:52:03,986 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.022) 0:00:01.502 ******* 2025-12-01 06:52:03,987 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:03 +0000 (0:00:00.022) 0:00:01.500 ******* 2025-12-01 06:52:04,003 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:04,009 p=32065 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-12-01 06:52:04,009 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:04 +0000 (0:00:00.022) 0:00:01.524 ******* 2025-12-01 06:52:04,009 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:04 +0000 (0:00:00.022) 0:00:01.523 ******* 2025-12-01 06:52:04,025 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:04,031 p=32065 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-12-01 06:52:04,031 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:04 +0000 (0:00:00.022) 0:00:01.546 ******* 2025-12-01 06:52:04,031 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:04 +0000 (0:00:00.022) 0:00:01.545 ******* 2025-12-01 06:52:05,221 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:05,235 p=32065 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-01 06:52:05,235 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:05 +0000 (0:00:01.204) 0:00:02.750 ******* 2025-12-01 06:52:05,235 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:05 +0000 (0:00:01.204) 0:00:02.749 ******* 2025-12-01 06:52:05,402 p=32065 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-12-01 06:52:05,548 p=32065 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-12-01 06:52:05,700 p=32065 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-12-01 06:52:05,708 p=32065 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-12-01 06:52:05,708 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:05 +0000 (0:00:00.473) 0:00:03.223 ******* 2025-12-01 06:52:05,708 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:05 +0000 (0:00:00.473) 0:00:03.222 ******* 2025-12-01 06:52:06,476 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:06,495 p=32065 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-12-01 06:52:06,496 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:06 +0000 (0:00:00.787) 0:00:04.011 ******* 2025-12-01 06:52:06,496 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:06 +0000 (0:00:00.787) 0:00:04.010 ******* 2025-12-01 06:52:07,936 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:07,941 p=32065 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-12-01 06:52:07,941 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:07 +0000 (0:00:01.445) 0:00:05.456 ******* 2025-12-01 06:52:07,941 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:07 +0000 (0:00:01.445) 0:00:05.455 ******* 2025-12-01 06:52:16,425 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:16,431 p=32065 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-12-01 06:52:16,431 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:16 +0000 (0:00:08.489) 0:00:13.946 ******* 2025-12-01 06:52:16,431 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:16 +0000 (0:00:08.489) 0:00:13.945 ******* 2025-12-01 06:52:17,083 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:17,089 p=32065 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-12-01 06:52:17,089 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.658) 0:00:14.604 ******* 2025-12-01 06:52:17,089 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.658) 0:00:14.603 ******* 2025-12-01 06:52:17,106 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:17,111 p=32065 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-12-01 06:52:17,111 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.021) 0:00:14.626 ******* 2025-12-01 06:52:17,111 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.021) 0:00:14.625 ******* 2025-12-01 06:52:17,899 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:17,905 p=32065 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-12-01 06:52:17,905 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.793) 0:00:15.420 ******* 2025-12-01 06:52:17,905 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.793) 0:00:15.419 ******* 2025-12-01 06:52:17,930 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:17,936 p=32065 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-12-01 06:52:17,936 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.451 ******* 2025-12-01 06:52:17,936 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.450 ******* 2025-12-01 06:52:17,961 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:17,967 p=32065 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-12-01 06:52:17,967 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.482 ******* 2025-12-01 06:52:17,967 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.481 ******* 2025-12-01 06:52:17,992 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:17,997 p=32065 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-12-01 06:52:17,997 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.512 ******* 2025-12-01 06:52:17,997 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:17 +0000 (0:00:00.030) 0:00:15.511 ******* 2025-12-01 06:52:18,483 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:18,489 p=32065 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-12-01 06:52:18,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:18 +0000 (0:00:00.491) 0:00:16.004 ******* 2025-12-01 06:52:18,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:18 +0000 (0:00:00.491) 0:00:16.003 ******* 2025-12-01 06:52:19,018 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:19,023 p=32065 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-12-01 06:52:19,024 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.534) 0:00:16.539 ******* 2025-12-01 06:52:19,024 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.534) 0:00:16.538 ******* 2025-12-01 06:52:19,037 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,043 p=32065 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-12-01 06:52:19,043 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.019) 0:00:16.559 ******* 2025-12-01 06:52:19,043 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.019) 0:00:16.557 ******* 2025-12-01 06:52:19,058 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,064 p=32065 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-12-01 06:52:19,064 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.021) 0:00:16.580 ******* 2025-12-01 06:52:19,064 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.021) 0:00:16.578 ******* 2025-12-01 06:52:19,090 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,096 p=32065 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-12-01 06:52:19,096 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.031) 0:00:16.611 ******* 2025-12-01 06:52:19,096 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.031) 0:00:16.610 ******* 2025-12-01 06:52:19,118 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:19,123 p=32065 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-12-01 06:52:19,123 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:16.638 ******* 2025-12-01 06:52:19,123 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:16.637 ******* 2025-12-01 06:52:19,135 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,140 p=32065 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-12-01 06:52:19,141 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.656 ******* 2025-12-01 06:52:19,141 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.654 ******* 2025-12-01 06:52:19,152 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,158 p=32065 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-12-01 06:52:19,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.673 ******* 2025-12-01 06:52:19,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.672 ******* 2025-12-01 06:52:19,169 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,175 p=32065 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-12-01 06:52:19,175 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.690 ******* 2025-12-01 06:52:19,175 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.689 ******* 2025-12-01 06:52:19,187 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,192 p=32065 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-12-01 06:52:19,192 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.707 ******* 2025-12-01 06:52:19,192 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.017) 0:00:16.706 ******* 2025-12-01 06:52:19,203 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,209 p=32065 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-12-01 06:52:19,209 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.016) 0:00:16.724 ******* 2025-12-01 06:52:19,209 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.016) 0:00:16.723 ******* 2025-12-01 06:52:19,219 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,226 p=32065 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-12-01 06:52:19,226 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.016) 0:00:16.741 ******* 2025-12-01 06:52:19,226 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.016) 0:00:16.740 ******* 2025-12-01 06:52:19,236 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,241 p=32065 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-12-01 06:52:19,241 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.015) 0:00:16.757 ******* 2025-12-01 06:52:19,241 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.015) 0:00:16.755 ******* 2025-12-01 06:52:19,393 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:19,399 p=32065 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-12-01 06:52:19,399 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.157) 0:00:16.915 ******* 2025-12-01 06:52:19,399 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.157) 0:00:16.913 ******* 2025-12-01 06:52:19,567 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:19,573 p=32065 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-12-01 06:52:19,573 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.173) 0:00:17.088 ******* 2025-12-01 06:52:19,573 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.173) 0:00:17.087 ******* 2025-12-01 06:52:19,747 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:19,753 p=32065 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-12-01 06:52:19,753 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.180) 0:00:17.269 ******* 2025-12-01 06:52:19,754 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.180) 0:00:17.267 ******* 2025-12-01 06:52:19,770 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,775 p=32065 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-12-01 06:52:19,775 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.021) 0:00:17.291 ******* 2025-12-01 06:52:19,775 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.021) 0:00:17.289 ******* 2025-12-01 06:52:19,798 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,803 p=32065 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-12-01 06:52:19,803 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.319 ******* 2025-12-01 06:52:19,803 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.317 ******* 2025-12-01 06:52:19,826 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,831 p=32065 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-12-01 06:52:19,831 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.346 ******* 2025-12-01 06:52:19,831 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.345 ******* 2025-12-01 06:52:19,855 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,860 p=32065 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-12-01 06:52:19,860 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.028) 0:00:17.375 ******* 2025-12-01 06:52:19,860 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.028) 0:00:17.374 ******* 2025-12-01 06:52:19,883 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,889 p=32065 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-12-01 06:52:19,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.028) 0:00:17.404 ******* 2025-12-01 06:52:19,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.028) 0:00:17.403 ******* 2025-12-01 06:52:19,911 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:19,916 p=32065 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-12-01 06:52:19,916 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.432 ******* 2025-12-01 06:52:19,916 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:19 +0000 (0:00:00.027) 0:00:17.430 ******* 2025-12-01 06:52:20,167 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:20,173 p=32065 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-12-01 06:52:20,173 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.256) 0:00:17.688 ******* 2025-12-01 06:52:20,173 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.256) 0:00:17.687 ******* 2025-12-01 06:52:20,349 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-12-01 06:52:20,512 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-12-01 06:52:20,519 p=32065 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-12-01 06:52:20,519 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.346) 0:00:18.034 ******* 2025-12-01 06:52:20,519 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.346) 0:00:18.033 ******* 2025-12-01 06:52:20,864 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:20,870 p=32065 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-12-01 06:52:20,870 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.350) 0:00:18.385 ******* 2025-12-01 06:52:20,870 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:20 +0000 (0:00:00.350) 0:00:18.384 ******* 2025-12-01 06:52:21,092 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:21,102 p=32065 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-12-01 06:52:21,102 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.231) 0:00:18.617 ******* 2025-12-01 06:52:21,102 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.231) 0:00:18.616 ******* 2025-12-01 06:52:21,131 p=32065 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-12-01 06:52:21,137 p=32065 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-12-01 06:52:21,137 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.035) 0:00:18.652 ******* 2025-12-01 06:52:21,137 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.035) 0:00:18.651 ******* 2025-12-01 06:52:21,151 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-12-01 06:52:21,157 p=32065 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-12-01 06:52:21,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.019) 0:00:18.672 ******* 2025-12-01 06:52:21,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:21 +0000 (0:00:00.019) 0:00:18.671 ******* 2025-12-01 06:52:46,683 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:46,689 p=32065 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-12-01 06:52:46,689 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:46 +0000 (0:00:25.532) 0:00:44.204 ******* 2025-12-01 06:52:46,689 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:46 +0000 (0:00:25.532) 0:00:44.203 ******* 2025-12-01 06:52:46,835 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:46,841 p=32065 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-12-01 06:52:46,841 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:46 +0000 (0:00:00.152) 0:00:44.356 ******* 2025-12-01 06:52:46,841 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:46 +0000 (0:00:00.152) 0:00:44.355 ******* 2025-12-01 06:52:46,997 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:47,003 p=32065 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-12-01 06:52:47,003 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:47 +0000 (0:00:00.162) 0:00:44.519 ******* 2025-12-01 06:52:47,004 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:47 +0000 (0:00:00.162) 0:00:44.517 ******* 2025-12-01 06:52:52,938 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:52,944 p=32065 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-01 06:52:52,944 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:52 +0000 (0:00:05.940) 0:00:50.459 ******* 2025-12-01 06:52:52,944 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:52 +0000 (0:00:05.940) 0:00:50.458 ******* 2025-12-01 06:52:52,962 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:52,968 p=32065 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-12-01 06:52:52,968 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:52 +0000 (0:00:00.024) 0:00:50.483 ******* 2025-12-01 06:52:52,968 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:52 +0000 (0:00:00.024) 0:00:50.482 ******* 2025-12-01 06:52:53,195 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:53,200 p=32065 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-12-01 06:52:53,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.232) 0:00:50.716 ******* 2025-12-01 06:52:53,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.232) 0:00:50.714 ******* 2025-12-01 06:52:53,449 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:53,454 p=32065 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-12-01 06:52:53,454 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.253) 0:00:50.969 ******* 2025-12-01 06:52:53,454 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.253) 0:00:50.968 ******* 2025-12-01 06:52:53,466 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,472 p=32065 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-12-01 06:52:53,472 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:50.987 ******* 2025-12-01 06:52:53,472 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.018) 0:00:50.986 ******* 2025-12-01 06:52:53,484 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,489 p=32065 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-12-01 06:52:53,490 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.005 ******* 2025-12-01 06:52:53,490 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.004 ******* 2025-12-01 06:52:53,502 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,508 p=32065 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-12-01 06:52:53,508 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.018) 0:00:51.023 ******* 2025-12-01 06:52:53,508 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.018) 0:00:51.022 ******* 2025-12-01 06:52:53,519 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,525 p=32065 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-12-01 06:52:53,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.040 ******* 2025-12-01 06:52:53,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.039 ******* 2025-12-01 06:52:53,536 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,542 p=32065 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-12-01 06:52:53,542 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.057 ******* 2025-12-01 06:52:53,542 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.017) 0:00:51.056 ******* 2025-12-01 06:52:53,558 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:53,564 p=32065 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-12-01 06:52:53,564 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.021) 0:00:51.079 ******* 2025-12-01 06:52:53,564 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:53 +0000 (0:00:00.021) 0:00:51.078 ******* 2025-12-01 06:52:53,756 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-12-01 06:52:53,909 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-12-01 06:52:54,077 p=32065 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-12-01 06:52:54,246 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-12-01 06:52:54,408 p=32065 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-12-01 06:52:54,418 p=32065 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-12-01 06:52:54,418 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.854) 0:00:51.934 ******* 2025-12-01 06:52:54,418 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.854) 0:00:51.932 ******* 2025-12-01 06:52:54,526 p=32065 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-12-01 06:52:54,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.107) 0:00:52.041 ******* 2025-12-01 06:52:54,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.107) 0:00:52.040 ******* 2025-12-01 06:52:54,691 p=32065 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-12-01 06:52:54,831 p=32065 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-12-01 06:52:54,968 p=32065 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-12-01 06:52:54,975 p=32065 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-12-01 06:52:54,975 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.448) 0:00:52.490 ******* 2025-12-01 06:52:54,975 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:54 +0000 (0:00:00.448) 0:00:52.489 ******* 2025-12-01 06:52:55,004 p=32065 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-12-01 06:52:55,005 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.029) 0:00:52.520 ******* 2025-12-01 06:52:55,005 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.029) 0:00:52.519 ******* 2025-12-01 06:52:55,025 p=32065 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-12-01 06:52:55,027 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,032 p=32065 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-12-01 06:52:55,032 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.027) 0:00:52.548 ******* 2025-12-01 06:52:55,032 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.027) 0:00:52.546 ******* 2025-12-01 06:52:55,052 p=32065 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-12-01 06:52:55,053 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,063 p=32065 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2025-12-01 06:52:55,063 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.030) 0:00:52.578 ******* 2025-12-01 06:52:55,063 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.030) 0:00:52.577 ******* 2025-12-01 06:52:55,097 p=32065 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2025-12-01 06:52:55,097 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.034) 0:00:52.612 ******* 2025-12-01 06:52:55,097 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.034) 0:00:52.611 ******* 2025-12-01 06:52:55,114 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,119 p=32065 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2025-12-01 06:52:55,119 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.022) 0:00:52.634 ******* 2025-12-01 06:52:55,119 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.022) 0:00:52.633 ******* 2025-12-01 06:52:55,135 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,141 p=32065 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2025-12-01 06:52:55,141 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.021) 0:00:52.656 ******* 2025-12-01 06:52:55,141 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.021) 0:00:52.655 ******* 2025-12-01 06:52:55,157 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,163 p=32065 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2025-12-01 06:52:55,163 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.022) 0:00:52.678 ******* 2025-12-01 06:52:55,163 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.022) 0:00:52.677 ******* 2025-12-01 06:52:55,180 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:55,190 p=32065 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-12-01 06:52:55,190 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.026) 0:00:52.705 ******* 2025-12-01 06:52:55,190 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.026) 0:00:52.704 ******* 2025-12-01 06:52:55,246 p=32065 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2025-12-01 06:52:55,253 p=32065 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-12-01 06:52:55,253 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.063) 0:00:52.768 ******* 2025-12-01 06:52:55,253 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.063) 0:00:52.767 ******* 2025-12-01 06:52:55,287 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:55,292 p=32065 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-12-01 06:52:55,293 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.039) 0:00:52.808 ******* 2025-12-01 06:52:55,293 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.039) 0:00:52.806 ******* 2025-12-01 06:52:55,716 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:55,723 p=32065 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-12-01 06:52:55,723 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.430) 0:00:53.238 ******* 2025-12-01 06:52:55,723 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.430) 0:00:53.237 ******* 2025-12-01 06:52:55,882 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:55,889 p=32065 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-12-01 06:52:55,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.165) 0:00:53.404 ******* 2025-12-01 06:52:55,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.166) 0:00:53.403 ******* 2025-12-01 06:52:55,918 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:55,930 p=32065 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-12-01 06:52:55,930 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.041) 0:00:53.445 ******* 2025-12-01 06:52:55,930 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:55 +0000 (0:00:00.041) 0:00:53.444 ******* 2025-12-01 06:52:56,254 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:56,259 p=32065 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-12-01 06:52:56,259 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.329) 0:00:53.775 ******* 2025-12-01 06:52:56,260 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.329) 0:00:53.773 ******* 2025-12-01 06:52:56,280 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:56,286 p=32065 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-12-01 06:52:56,286 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.026) 0:00:53.801 ******* 2025-12-01 06:52:56,286 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.026) 0:00:53.800 ******* 2025-12-01 06:52:56,300 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2025-12-01 06:52:56,306 p=32065 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-12-01 06:52:56,307 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.020) 0:00:53.822 ******* 2025-12-01 06:52:56,307 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.020) 0:00:53.820 ******* 2025-12-01 06:52:56,331 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_USER:' 2025-12-01 06:52:56,339 p=32065 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-12-01 06:52:56,339 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.032) 0:00:53.854 ******* 2025-12-01 06:52:56,339 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.032) 0:00:53.853 ******* 2025-12-01 06:52:56,612 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:56,618 p=32065 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-12-01 06:52:56,619 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.279) 0:00:54.134 ******* 2025-12-01 06:52:56,619 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.279) 0:00:54.133 ******* 2025-12-01 06:52:56,637 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-12-01 06:52:56,644 p=32065 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-12-01 06:52:56,644 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.025) 0:00:54.159 ******* 2025-12-01 06:52:56,644 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.025) 0:00:54.158 ******* 2025-12-01 06:52:56,961 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:56,967 p=32065 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-12-01 06:52:56,967 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.323) 0:00:54.483 ******* 2025-12-01 06:52:56,967 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.323) 0:00:54.481 ******* 2025-12-01 06:52:56,984 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:56,997 p=32065 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-12-01 06:52:56,997 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.029) 0:00:54.512 ******* 2025-12-01 06:52:56,997 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:56 +0000 (0:00:00.029) 0:00:54.511 ******* 2025-12-01 06:52:58,529 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:58,535 p=32065 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-12-01 06:52:58,535 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:01.538) 0:00:56.051 ******* 2025-12-01 06:52:58,536 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:01.538) 0:00:56.049 ******* 2025-12-01 06:52:58,554 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:58,564 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-12-01 06:52:58,565 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.029) 0:00:56.080 ******* 2025-12-01 06:52:58,565 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.029) 0:00:56.079 ******* 2025-12-01 06:52:58,887 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:52:58,898 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:52:58,898 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.333) 0:00:56.413 ******* 2025-12-01 06:52:58,898 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.333) 0:00:56.412 ******* 2025-12-01 06:52:58,947 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:58,953 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:52:58,953 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.054) 0:00:56.468 ******* 2025-12-01 06:52:58,953 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:58 +0000 (0:00:00.054) 0:00:56.467 ******* 2025-12-01 06:52:59,014 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,021 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:52:59,022 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.068) 0:00:56.537 ******* 2025-12-01 06:52:59,022 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.068) 0:00:56.536 ******* 2025-12-01 06:52:59,103 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-12-01 06:52:59,112 p=32065 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-12-01 06:52:59,112 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.090) 0:00:56.627 ******* 2025-12-01 06:52:59,112 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.090) 0:00:56.626 ******* 2025-12-01 06:52:59,150 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,157 p=32065 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-12-01 06:52:59,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.044) 0:00:56.672 ******* 2025-12-01 06:52:59,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.044) 0:00:56.671 ******* 2025-12-01 06:52:59,309 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,316 p=32065 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-12-01 06:52:59,316 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.159) 0:00:56.831 ******* 2025-12-01 06:52:59,316 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.159) 0:00:56.830 ******* 2025-12-01 06:52:59,329 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:52:59,335 p=32065 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-12-01 06:52:59,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.019) 0:00:56.850 ******* 2025-12-01 06:52:59,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.019) 0:00:56.849 ******* 2025-12-01 06:52:59,481 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,487 p=32065 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-12-01 06:52:59,487 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.152) 0:00:57.002 ******* 2025-12-01 06:52:59,487 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.152) 0:00:57.001 ******* 2025-12-01 06:52:59,502 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,508 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-12-01 06:52:59,509 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.021) 0:00:57.024 ******* 2025-12-01 06:52:59,509 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.021) 0:00:57.022 ******* 2025-12-01 06:52:59,656 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,662 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 06:52:59,662 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.153) 0:00:57.177 ******* 2025-12-01 06:52:59,662 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.153) 0:00:57.176 ******* 2025-12-01 06:52:59,809 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:52:59,818 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-12-01 06:52:59,818 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.155) 0:00:57.333 ******* 2025-12-01 06:52:59,818 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:52:59 +0000 (0:00:00.155) 0:00:57.332 ******* 2025-12-01 06:52:59,861 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2025-12-01 06:53:29,325 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:29,331 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-12-01 06:53:29,332 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:29.513) 0:01:26.847 ******* 2025-12-01 06:53:29,332 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:29.513) 0:01:26.846 ******* 2025-12-01 06:53:29,345 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,351 p=32065 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:53:29,351 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.019) 0:01:26.867 ******* 2025-12-01 06:53:29,351 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.019) 0:01:26.865 ******* 2025-12-01 06:53:29,489 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:29,496 p=32065 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:53:29,496 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.144) 0:01:27.011 ******* 2025-12-01 06:53:29,496 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.144) 0:01:27.010 ******* 2025-12-01 06:53:29,507 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,537 p=32065 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-12-01 06:53:29,551 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:53:29,551 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.055) 0:01:27.067 ******* 2025-12-01 06:53:29,552 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.055) 0:01:27.065 ******* 2025-12-01 06:53:29,587 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:29,594 p=32065 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-12-01 06:53:29,594 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.042) 0:01:27.109 ******* 2025-12-01 06:53:29,594 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.042) 0:01:27.108 ******* 2025-12-01 06:53:29,610 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,616 p=32065 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-12-01 06:53:29,617 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.022) 0:01:27.132 ******* 2025-12-01 06:53:29,617 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.022) 0:01:27.131 ******* 2025-12-01 06:53:29,632 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,660 p=32065 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-12-01 06:53:29,690 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:53:29,691 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.073) 0:01:27.206 ******* 2025-12-01 06:53:29,691 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.073) 0:01:27.204 ******* 2025-12-01 06:53:29,724 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:29,732 p=32065 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-12-01 06:53:29,732 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.041) 0:01:27.247 ******* 2025-12-01 06:53:29,732 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.041) 0:01:27.246 ******* 2025-12-01 06:53:29,878 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:29,885 p=32065 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-12-01 06:53:29,885 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.152) 0:01:27.400 ******* 2025-12-01 06:53:29,885 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.152) 0:01:27.399 ******* 2025-12-01 06:53:29,902 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,909 p=32065 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-12-01 06:53:29,909 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.424 ******* 2025-12-01 06:53:29,909 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.423 ******* 2025-12-01 06:53:29,926 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,932 p=32065 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-12-01 06:53:29,933 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.448 ******* 2025-12-01 06:53:29,933 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.447 ******* 2025-12-01 06:53:29,950 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,961 p=32065 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-12-01 06:53:29,961 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.028) 0:01:27.477 ******* 2025-12-01 06:53:29,961 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.028) 0:01:27.475 ******* 2025-12-01 06:53:29,979 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:29,985 p=32065 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-12-01 06:53:29,985 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.500 ******* 2025-12-01 06:53:29,985 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:29 +0000 (0:00:00.023) 0:01:27.499 ******* 2025-12-01 06:53:30,004 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,011 p=32065 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-12-01 06:53:30,011 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.026) 0:01:27.526 ******* 2025-12-01 06:53:30,011 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.026) 0:01:27.525 ******* 2025-12-01 06:53:30,026 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,033 p=32065 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 06:53:30,033 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.021) 0:01:27.548 ******* 2025-12-01 06:53:30,033 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.021) 0:01:27.547 ******* 2025-12-01 06:53:30,185 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:30,192 p=32065 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-12-01 06:53:30,192 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.158) 0:01:27.707 ******* 2025-12-01 06:53:30,192 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.158) 0:01:27.706 ******* 2025-12-01 06:53:30,214 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-12-01 06:53:30,225 p=32065 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-12-01 06:53:30,225 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.033) 0:01:27.740 ******* 2025-12-01 06:53:30,225 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.033) 0:01:27.739 ******* 2025-12-01 06:53:30,242 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,248 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-12-01 06:53:30,249 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:27.764 ******* 2025-12-01 06:53:30,249 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:27.763 ******* 2025-12-01 06:53:30,265 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,271 p=32065 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-12-01 06:53:30,271 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:27.787 ******* 2025-12-01 06:53:30,271 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:27.785 ******* 2025-12-01 06:53:30,287 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,294 p=32065 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{********** cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-12-01 06:53:30,294 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:27.810 ******* 2025-12-01 06:53:30,294 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:27.808 ******* 2025-12-01 06:53:30,320 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:30,326 p=32065 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-12-01 06:53:30,326 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.031) 0:01:27.841 ******* 2025-12-01 06:53:30,326 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.031) 0:01:27.840 ******* 2025-12-01 06:53:30,465 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:30,472 p=32065 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-12-01 06:53:30,472 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.145) 0:01:27.987 ******* 2025-12-01 06:53:30,472 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.145) 0:01:27.986 ******* 2025-12-01 06:53:30,495 p=32065 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-01 06:53:30,502 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-12-01 06:53:30,502 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.030) 0:01:28.017 ******* 2025-12-01 06:53:30,502 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.030) 0:01:28.016 ******* 2025-12-01 06:53:30,519 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,526 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-12-01 06:53:30,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:28.041 ******* 2025-12-01 06:53:30,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:28.040 ******* 2025-12-01 06:53:30,542 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,549 p=32065 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-12-01 06:53:30,549 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:28.064 ******* 2025-12-01 06:53:30,549 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:28.063 ******* 2025-12-01 06:53:30,565 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,572 p=32065 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-12-01 06:53:30,572 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:28.087 ******* 2025-12-01 06:53:30,572 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.022) 0:01:28.086 ******* 2025-12-01 06:53:30,591 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:30,598 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-12-01 06:53:30,598 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.026) 0:01:28.113 ******* 2025-12-01 06:53:30,598 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.026) 0:01:28.112 ******* 2025-12-01 06:53:30,617 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-12-01 06:53:30,626 p=32065 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-12-01 06:53:30,626 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.028) 0:01:28.141 ******* 2025-12-01 06:53:30,626 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.028) 0:01:28.140 ******* 2025-12-01 06:53:30,639 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:30,646 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-12-01 06:53:30,646 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.020) 0:01:28.161 ******* 2025-12-01 06:53:30,646 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.020) 0:01:28.160 ******* 2025-12-01 06:53:30,688 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-12-01 06:53:30,925 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:30,932 p=32065 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-12-01 06:53:30,932 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.285) 0:01:28.447 ******* 2025-12-01 06:53:30,932 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.285) 0:01:28.446 ******* 2025-12-01 06:53:30,949 p=32065 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-01 06:53:30,955 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-12-01 06:53:30,955 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:28.470 ******* 2025-12-01 06:53:30,955 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:30 +0000 (0:00:00.023) 0:01:28.469 ******* 2025-12-01 06:53:31,179 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:31,186 p=32065 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-12-01 06:53:31,186 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.231) 0:01:28.702 ******* 2025-12-01 06:53:31,187 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.231) 0:01:28.700 ******* 2025-12-01 06:53:31,207 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:31,213 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-12-01 06:53:31,213 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.026) 0:01:28.729 ******* 2025-12-01 06:53:31,213 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.026) 0:01:28.727 ******* 2025-12-01 06:53:31,425 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:31,432 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-12-01 06:53:31,433 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.219) 0:01:28.948 ******* 2025-12-01 06:53:31,433 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.219) 0:01:28.947 ******* 2025-12-01 06:53:31,662 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:31,669 p=32065 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-12-01 06:53:31,669 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.236) 0:01:29.184 ******* 2025-12-01 06:53:31,669 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.236) 0:01:29.183 ******* 2025-12-01 06:53:31,898 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:31,906 p=32065 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-12-01 06:53:31,906 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.236) 0:01:29.421 ******* 2025-12-01 06:53:31,906 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.236) 0:01:29.420 ******* 2025-12-01 06:53:31,934 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:31,940 p=32065 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-12-01 06:53:31,940 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.034) 0:01:29.456 ******* 2025-12-01 06:53:31,941 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:31 +0000 (0:00:00.034) 0:01:29.454 ******* 2025-12-01 06:53:32,262 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:32,269 p=32065 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-12-01 06:53:32,269 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.328) 0:01:29.785 ******* 2025-12-01 06:53:32,269 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.328) 0:01:29.783 ******* 2025-12-01 06:53:32,522 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:32,529 p=32065 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-12-01 06:53:32,529 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.259) 0:01:30.044 ******* 2025-12-01 06:53:32,529 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.259) 0:01:30.043 ******* 2025-12-01 06:53:32,906 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:32,917 p=32065 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 06:53:32,918 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.388) 0:01:30.433 ******* 2025-12-01 06:53:32,918 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:32 +0000 (0:00:00.388) 0:01:30.432 ******* 2025-12-01 06:53:33,070 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:33,077 p=32065 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-12-01 06:53:33,078 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:33 +0000 (0:00:00.160) 0:01:30.593 ******* 2025-12-01 06:53:33,078 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:33 +0000 (0:00:00.160) 0:01:30.592 ******* 2025-12-01 06:53:33,099 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:33,108 p=32065 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-12-01 06:53:33,108 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:33 +0000 (0:00:00.030) 0:01:30.624 ******* 2025-12-01 06:53:33,108 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:33 +0000 (0:00:00.030) 0:01:30.622 ******* 2025-12-01 06:53:33,904 p=32065 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-12-01 06:53:34,472 p=32065 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-12-01 06:53:34,482 p=32065 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-12-01 06:53:34,482 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:01.373) 0:01:31.997 ******* 2025-12-01 06:53:34,482 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:01.373) 0:01:31.996 ******* 2025-12-01 06:53:34,494 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,501 p=32065 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-12-01 06:53:34,501 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.019) 0:01:32.016 ******* 2025-12-01 06:53:34,501 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.019) 0:01:32.015 ******* 2025-12-01 06:53:34,517 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-12-01 06:53:34,518 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-12-01 06:53:34,518 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,525 p=32065 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-12-01 06:53:34,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.040 ******* 2025-12-01 06:53:34,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.039 ******* 2025-12-01 06:53:34,543 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,550 p=32065 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-12-01 06:53:34,550 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.065 ******* 2025-12-01 06:53:34,550 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.064 ******* 2025-12-01 06:53:34,568 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,575 p=32065 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-12-01 06:53:34,575 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.090 ******* 2025-12-01 06:53:34,575 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.024) 0:01:32.089 ******* 2025-12-01 06:53:34,591 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,598 p=32065 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-12-01 06:53:34,598 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.023) 0:01:32.113 ******* 2025-12-01 06:53:34,598 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.023) 0:01:32.112 ******* 2025-12-01 06:53:34,614 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,621 p=32065 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-12-01 06:53:34,621 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.136 ******* 2025-12-01 06:53:34,621 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.135 ******* 2025-12-01 06:53:34,636 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,643 p=32065 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-12-01 06:53:34,643 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.158 ******* 2025-12-01 06:53:34,643 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.157 ******* 2025-12-01 06:53:34,659 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,666 p=32065 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-12-01 06:53:34,666 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.181 ******* 2025-12-01 06:53:34,666 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.022) 0:01:32.180 ******* 2025-12-01 06:53:34,683 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:34,692 p=32065 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-12-01 06:53:34,692 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.025) 0:01:32.207 ******* 2025-12-01 06:53:34,692 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:34 +0000 (0:00:00.025) 0:01:32.206 ******* 2025-12-01 06:53:35,291 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:35,299 p=32065 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-12-01 06:53:35,299 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:35 +0000 (0:00:00.607) 0:01:32.814 ******* 2025-12-01 06:53:35,299 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:35 +0000 (0:00:00.607) 0:01:32.813 ******* 2025-12-01 06:53:35,320 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:35,327 p=32065 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-12-01 06:53:35,327 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:35 +0000 (0:00:00.028) 0:01:32.842 ******* 2025-12-01 06:53:35,327 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:35 +0000 (0:00:00.028) 0:01:32.841 ******* 2025-12-01 06:53:36,058 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:36,069 p=32065 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-12-01 06:53:36,069 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:36 +0000 (0:00:00.741) 0:01:33.584 ******* 2025-12-01 06:53:36,069 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:36 +0000 (0:00:00.741) 0:01:33.583 ******* 2025-12-01 06:53:36,805 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:36,814 p=32065 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-12-01 06:53:36,814 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:36 +0000 (0:00:00.745) 0:01:34.329 ******* 2025-12-01 06:53:36,814 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:36 +0000 (0:00:00.745) 0:01:34.328 ******* 2025-12-01 06:53:37,405 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:37,413 p=32065 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-12-01 06:53:37,413 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.598) 0:01:34.928 ******* 2025-12-01 06:53:37,413 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.598) 0:01:34.927 ******* 2025-12-01 06:53:37,428 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:37,435 p=32065 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-12-01 06:53:37,435 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.022) 0:01:34.950 ******* 2025-12-01 06:53:37,435 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.022) 0:01:34.949 ******* 2025-12-01 06:53:37,450 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:37,462 p=32065 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-12-01 06:53:37,462 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.027) 0:01:34.977 ******* 2025-12-01 06:53:37,462 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.027) 0:01:34.976 ******* 2025-12-01 06:53:37,479 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:37,486 p=32065 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-12-01 06:53:37,486 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.024) 0:01:35.001 ******* 2025-12-01 06:53:37,486 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.024) 0:01:35.000 ******* 2025-12-01 06:53:37,503 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:37,510 p=32065 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-12-01 06:53:37,510 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.023) 0:01:35.025 ******* 2025-12-01 06:53:37,510 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.023) 0:01:35.024 ******* 2025-12-01 06:53:37,585 p=32065 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-12-01 06:53:37,585 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.075) 0:01:35.100 ******* 2025-12-01 06:53:37,585 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.075) 0:01:35.099 ******* 2025-12-01 06:53:37,740 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:37,747 p=32065 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-12-01 06:53:37,747 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.162) 0:01:35.263 ******* 2025-12-01 06:53:37,747 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:37 +0000 (0:00:00.162) 0:01:35.261 ******* 2025-12-01 06:53:38,332 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:38,339 p=32065 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-12-01 06:53:38,340 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.592) 0:01:35.855 ******* 2025-12-01 06:53:38,340 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.592) 0:01:35.854 ******* 2025-12-01 06:53:38,362 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-12-01 06:53:38,372 p=32065 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-12-01 06:53:38,372 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.032) 0:01:35.887 ******* 2025-12-01 06:53:38,372 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.032) 0:01:35.886 ******* 2025-12-01 06:53:38,993 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:39,000 p=32065 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-12-01 06:53:39,000 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.627) 0:01:36.515 ******* 2025-12-01 06:53:39,000 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:38 +0000 (0:00:00.627) 0:01:36.514 ******* 2025-12-01 06:53:41,183 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:41,238 p=32065 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-12-01 06:53:41,238 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:02.238) 0:01:38.753 ******* 2025-12-01 06:53:41,238 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:02.238) 0:01:38.752 ******* 2025-12-01 06:53:41,252 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:41,261 p=32065 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-12-01 06:53:41,261 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:00.023) 0:01:38.776 ******* 2025-12-01 06:53:41,261 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:00.023) 0:01:38.775 ******* 2025-12-01 06:53:41,854 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:41,861 p=32065 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-12-01 06:53:41,861 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:00.600) 0:01:39.377 ******* 2025-12-01 06:53:41,862 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:41 +0000 (0:00:00.600) 0:01:39.375 ******* 2025-12-01 06:53:52,526 p=32065 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-12-01 06:53:53,102 p=32065 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-12-01 06:53:53,669 p=32065 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-12-01 06:53:53,684 p=32065 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2025-12-01 06:53:53,684 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:53 +0000 (0:00:11.822) 0:01:51.200 ******* 2025-12-01 06:53:53,685 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:53 +0000 (0:00:11.822) 0:01:51.198 ******* 2025-12-01 06:53:53,882 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:53,889 p=32065 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2025-12-01 06:53:53,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:53 +0000 (0:00:00.204) 0:01:51.405 ******* 2025-12-01 06:53:53,889 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:53 +0000 (0:00:00.204) 0:01:51.403 ******* 2025-12-01 06:53:55,219 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:55,226 p=32065 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2025-12-01 06:53:55,227 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:01.337) 0:01:52.742 ******* 2025-12-01 06:53:55,227 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:01.337) 0:01:52.740 ******* 2025-12-01 06:53:55,466 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:53:55,479 p=32065 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-12-01 06:53:55,479 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.252) 0:01:52.994 ******* 2025-12-01 06:53:55,479 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.252) 0:01:52.993 ******* 2025-12-01 06:53:55,496 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:55,503 p=32065 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-12-01 06:53:55,503 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.024) 0:01:53.018 ******* 2025-12-01 06:53:55,503 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.024) 0:01:53.017 ******* 2025-12-01 06:53:55,518 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:55,525 p=32065 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-12-01 06:53:55,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.021) 0:01:53.040 ******* 2025-12-01 06:53:55,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.021) 0:01:53.039 ******* 2025-12-01 06:53:55,539 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:55,545 p=32065 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-12-01 06:53:55,545 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.020) 0:01:53.061 ******* 2025-12-01 06:53:55,546 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.020) 0:01:53.059 ******* 2025-12-01 06:53:55,562 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:55,568 p=32065 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-12-01 06:53:55,568 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.022) 0:01:53.083 ******* 2025-12-01 06:53:55,568 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.022) 0:01:53.082 ******* 2025-12-01 06:53:55,588 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:55,595 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:53:55,595 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.026) 0:01:53.110 ******* 2025-12-01 06:53:55,595 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.026) 0:01:53.109 ******* 2025-12-01 06:53:55,643 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:55,650 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:53:55,650 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.055) 0:01:53.166 ******* 2025-12-01 06:53:55,651 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.055) 0:01:53.164 ******* 2025-12-01 06:53:55,716 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:55,724 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:53:55,724 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.073) 0:01:53.239 ******* 2025-12-01 06:53:55,724 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.073) 0:01:53.238 ******* 2025-12-01 06:53:55,809 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2025-12-01 06:53:55,819 p=32065 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-12-01 06:53:55,819 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.095) 0:01:53.335 ******* 2025-12-01 06:53:55,819 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.095) 0:01:53.333 ******* 2025-12-01 06:53:55,859 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:55,866 p=32065 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-12-01 06:53:55,866 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.046) 0:01:53.381 ******* 2025-12-01 06:53:55,866 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:55 +0000 (0:00:00.046) 0:01:53.380 ******* 2025-12-01 06:53:56,025 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:56,033 p=32065 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-12-01 06:53:56,033 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.166) 0:01:53.548 ******* 2025-12-01 06:53:56,033 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.166) 0:01:53.547 ******* 2025-12-01 06:53:56,045 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:53:56,053 p=32065 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-12-01 06:53:56,053 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.019) 0:01:53.568 ******* 2025-12-01 06:53:56,053 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.019) 0:01:53.567 ******* 2025-12-01 06:53:56,203 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:56,210 p=32065 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-12-01 06:53:56,210 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.157) 0:01:53.725 ******* 2025-12-01 06:53:56,210 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.157) 0:01:53.724 ******* 2025-12-01 06:53:56,227 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:56,234 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-12-01 06:53:56,234 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.023) 0:01:53.749 ******* 2025-12-01 06:53:56,234 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.023) 0:01:53.748 ******* 2025-12-01 06:53:56,390 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:56,398 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 06:53:56,398 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.163) 0:01:53.913 ******* 2025-12-01 06:53:56,398 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.163) 0:01:53.912 ******* 2025-12-01 06:53:56,554 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:53:56,562 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2025-12-01 06:53:56,562 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.164) 0:01:54.078 ******* 2025-12-01 06:53:56,562 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:53:56 +0000 (0:00:00.164) 0:01:54.076 ******* 2025-12-01 06:53:56,607 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log 2025-12-01 06:54:04,594 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:04,602 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2025-12-01 06:54:04,602 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:08.040) 0:02:02.118 ******* 2025-12-01 06:54:04,603 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:08.040) 0:02:02.116 ******* 2025-12-01 06:54:04,624 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:04,631 p=32065 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:54:04,631 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.029) 0:02:02.147 ******* 2025-12-01 06:54:04,632 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.029) 0:02:02.145 ******* 2025-12-01 06:54:04,794 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:04,802 p=32065 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:54:04,803 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.171) 0:02:02.318 ******* 2025-12-01 06:54:04,803 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.171) 0:02:02.317 ******* 2025-12-01 06:54:04,823 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:04,840 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:04,840 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.037) 0:02:02.355 ******* 2025-12-01 06:54:04,840 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.037) 0:02:02.354 ******* 2025-12-01 06:54:04,887 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:04,894 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:04,894 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.053) 0:02:02.409 ******* 2025-12-01 06:54:04,894 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.053) 0:02:02.408 ******* 2025-12-01 06:54:04,960 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:04,968 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:04,968 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.074) 0:02:02.483 ******* 2025-12-01 06:54:04,968 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:04 +0000 (0:00:00.074) 0:02:02.482 ******* 2025-12-01 06:54:05,033 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,045 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:54:05,046 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:02.561 ******* 2025-12-01 06:54:05,046 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:02.559 ******* 2025-12-01 06:54:05,083 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,092 p=32065 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-12-01 06:54:05,092 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.046) 0:02:02.607 ******* 2025-12-01 06:54:05,092 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.046) 0:02:02.606 ******* 2025-12-01 06:54:05,113 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,120 p=32065 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-12-01 06:54:05,120 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.028) 0:02:02.635 ******* 2025-12-01 06:54:05,120 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.028) 0:02:02.634 ******* 2025-12-01 06:54:05,132 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,144 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:05,144 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.023) 0:02:02.659 ******* 2025-12-01 06:54:05,144 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.023) 0:02:02.658 ******* 2025-12-01 06:54:05,190 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,197 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:05,197 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.053) 0:02:02.712 ******* 2025-12-01 06:54:05,197 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.053) 0:02:02.711 ******* 2025-12-01 06:54:05,264 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,273 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:05,273 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.076) 0:02:02.789 ******* 2025-12-01 06:54:05,273 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.076) 0:02:02.787 ******* 2025-12-01 06:54:05,339 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,356 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:05,357 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.083) 0:02:02.872 ******* 2025-12-01 06:54:05,357 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.083) 0:02:02.871 ******* 2025-12-01 06:54:05,403 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,410 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:05,410 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.053) 0:02:02.925 ******* 2025-12-01 06:54:05,410 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.053) 0:02:02.924 ******* 2025-12-01 06:54:05,477 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,485 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:05,485 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.075) 0:02:03.000 ******* 2025-12-01 06:54:05,485 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.075) 0:02:02.999 ******* 2025-12-01 06:54:05,551 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,562 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:54:05,562 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:03.077 ******* 2025-12-01 06:54:05,562 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:03.076 ******* 2025-12-01 06:54:05,631 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,640 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-12-01 06:54:05,640 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:03.155 ******* 2025-12-01 06:54:05,640 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.077) 0:02:03.154 ******* 2025-12-01 06:54:05,658 p=32065 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-12-01 06:54:05,664 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:05,664 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.024) 0:02:03.180 ******* 2025-12-01 06:54:05,664 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.024) 0:02:03.178 ******* 2025-12-01 06:54:05,710 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,717 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:05,717 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.052) 0:02:03.232 ******* 2025-12-01 06:54:05,717 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.052) 0:02:03.231 ******* 2025-12-01 06:54:05,783 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,791 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:05,791 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.073) 0:02:03.306 ******* 2025-12-01 06:54:05,791 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.073) 0:02:03.305 ******* 2025-12-01 06:54:05,857 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:05,874 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:05,874 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.083) 0:02:03.390 ******* 2025-12-01 06:54:05,874 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.083) 0:02:03.388 ******* 2025-12-01 06:54:05,922 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:05,930 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:05,930 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.056) 0:02:03.446 ******* 2025-12-01 06:54:05,931 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:05 +0000 (0:00:00.056) 0:02:03.444 ******* 2025-12-01 06:54:05,996 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,003 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:06,003 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.072) 0:02:03.519 ******* 2025-12-01 06:54:06,004 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.072) 0:02:03.517 ******* 2025-12-01 06:54:06,070 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,082 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:54:06,082 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.078) 0:02:03.597 ******* 2025-12-01 06:54:06,082 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.078) 0:02:03.596 ******* 2025-12-01 06:54:06,180 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,187 p=32065 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-01 06:54:06,187 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.105) 0:02:03.703 ******* 2025-12-01 06:54:06,188 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.105) 0:02:03.701 ******* 2025-12-01 06:54:06,211 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-12-01 06:54:06,215 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-12-01 06:54:06,215 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,222 p=32065 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-12-01 06:54:06,223 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.035) 0:02:03.738 ******* 2025-12-01 06:54:06,223 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.035) 0:02:03.736 ******* 2025-12-01 06:54:06,243 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,250 p=32065 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-12-01 06:54:06,250 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.765 ******* 2025-12-01 06:54:06,250 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.764 ******* 2025-12-01 06:54:06,273 p=32065 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-12-01 06:54:06,273 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,280 p=32065 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-12-01 06:54:06,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.030) 0:02:03.795 ******* 2025-12-01 06:54:06,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.030) 0:02:03.794 ******* 2025-12-01 06:54:06,301 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,308 p=32065 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-12-01 06:54:06,308 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.823 ******* 2025-12-01 06:54:06,308 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.822 ******* 2025-12-01 06:54:06,328 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,335 p=32065 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-12-01 06:54:06,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.851 ******* 2025-12-01 06:54:06,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.849 ******* 2025-12-01 06:54:06,358 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,364 p=32065 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-12-01 06:54:06,364 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.028) 0:02:03.879 ******* 2025-12-01 06:54:06,364 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.028) 0:02:03.878 ******* 2025-12-01 06:54:06,385 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,392 p=32065 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-12-01 06:54:06,392 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.907 ******* 2025-12-01 06:54:06,392 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.906 ******* 2025-12-01 06:54:06,412 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,419 p=32065 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-12-01 06:54:06,419 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.935 ******* 2025-12-01 06:54:06,420 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.933 ******* 2025-12-01 06:54:06,440 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,447 p=32065 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-12-01 06:54:06,447 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.962 ******* 2025-12-01 06:54:06,447 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.027) 0:02:03.961 ******* 2025-12-01 06:54:06,467 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,479 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:06,479 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.032) 0:02:03.994 ******* 2025-12-01 06:54:06,479 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.032) 0:02:03.993 ******* 2025-12-01 06:54:06,526 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,533 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:06,533 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.054) 0:02:04.048 ******* 2025-12-01 06:54:06,533 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.054) 0:02:04.047 ******* 2025-12-01 06:54:06,602 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,610 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:06,610 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.076) 0:02:04.125 ******* 2025-12-01 06:54:06,610 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.076) 0:02:04.124 ******* 2025-12-01 06:54:06,677 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:06,694 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 06:54:06,694 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.083) 0:02:04.209 ******* 2025-12-01 06:54:06,694 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.083) 0:02:04.208 ******* 2025-12-01 06:54:06,743 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,749 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 06:54:06,749 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.055) 0:02:04.264 ******* 2025-12-01 06:54:06,749 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.055) 0:02:04.263 ******* 2025-12-01 06:54:06,818 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,826 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-12-01 06:54:06,826 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.077) 0:02:04.342 ******* 2025-12-01 06:54:06,826 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.077) 0:02:04.340 ******* 2025-12-01 06:54:06,915 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2025-12-01 06:54:06,925 p=32065 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Kustomize OpenStack CR cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-12-01 06:54:06,926 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.099) 0:02:04.441 ******* 2025-12-01 06:54:06,926 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.099) 0:02:04.439 ******* 2025-12-01 06:54:06,967 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:06,974 p=32065 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-12-01 06:54:06,974 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.048) 0:02:04.490 ******* 2025-12-01 06:54:06,975 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:06 +0000 (0:00:00.048) 0:02:04.488 ******* 2025-12-01 06:54:07,140 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:07,147 p=32065 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-12-01 06:54:07,147 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.172) 0:02:04.662 ******* 2025-12-01 06:54:07,147 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.172) 0:02:04.661 ******* 2025-12-01 06:54:07,167 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:07,174 p=32065 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-12-01 06:54:07,174 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.026) 0:02:04.689 ******* 2025-12-01 06:54:07,174 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.026) 0:02:04.688 ******* 2025-12-01 06:54:07,328 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:07,335 p=32065 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-12-01 06:54:07,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.161) 0:02:04.851 ******* 2025-12-01 06:54:07,335 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.161) 0:02:04.849 ******* 2025-12-01 06:54:07,356 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:07,363 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-12-01 06:54:07,363 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.027) 0:02:04.878 ******* 2025-12-01 06:54:07,363 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.027) 0:02:04.877 ******* 2025-12-01 06:54:07,519 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:07,526 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 06:54:07,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.162) 0:02:05.041 ******* 2025-12-01 06:54:07,526 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.162) 0:02:05.040 ******* 2025-12-01 06:54:07,684 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:07,693 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Kustomize OpenStack CR] *********** 2025-12-01 06:54:07,693 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.166) 0:02:05.208 ******* 2025-12-01 06:54:07,693 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:07 +0000 (0:00:00.166) 0:02:05.207 ******* 2025-12-01 06:54:07,738 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log 2025-12-01 06:54:09,121 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:09,129 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Kustomize OpenStack CR] ************** 2025-12-01 06:54:09,129 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:01.436) 0:02:06.644 ******* 2025-12-01 06:54:09,129 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:01.436) 0:02:06.643 ******* 2025-12-01 06:54:09,150 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:09,157 p=32065 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:54:09,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.027) 0:02:06.672 ******* 2025-12-01 06:54:09,157 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.027) 0:02:06.671 ******* 2025-12-01 06:54:09,305 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:09,312 p=32065 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 06:54:09,312 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.155) 0:02:06.827 ******* 2025-12-01 06:54:09,312 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.155) 0:02:06.826 ******* 2025-12-01 06:54:09,331 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:09,343 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 06:54:09,343 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.031) 0:02:06.858 ******* 2025-12-01 06:54:09,343 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.031) 0:02:06.857 ******* 2025-12-01 06:54:09,386 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:09,394 p=32065 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-12-01 06:54:09,394 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.051) 0:02:06.910 ******* 2025-12-01 06:54:09,395 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.051) 0:02:06.908 ******* 2025-12-01 06:54:09,487 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-12-01 06:54:09,487 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.092) 0:02:07.002 ******* 2025-12-01 06:54:09,487 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.092) 0:02:07.001 ******* 2025-12-01 06:54:09,648 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:09,654 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-12-01 06:54:09,655 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.167) 0:02:07.170 ******* 2025-12-01 06:54:09,655 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:09 +0000 (0:00:00.167) 0:02:07.169 ******* 2025-12-01 06:54:10,251 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:10,258 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-12-01 06:54:10,258 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:10 +0000 (0:00:00.603) 0:02:07.773 ******* 2025-12-01 06:54:10,258 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:10 +0000 (0:00:00.603) 0:02:07.772 ******* 2025-12-01 06:54:10,586 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:10,594 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-12-01 06:54:10,594 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:10 +0000 (0:00:00.335) 0:02:08.109 ******* 2025-12-01 06:54:10,594 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:10 +0000 (0:00:00.335) 0:02:08.108 ******* 2025-12-01 06:54:11,191 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:11,200 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-12-01 06:54:11,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:11 +0000 (0:00:00.606) 0:02:08.715 ******* 2025-12-01 06:54:11,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:11 +0000 (0:00:00.606) 0:02:08.714 ******* 2025-12-01 06:54:11,392 p=32065 u=zuul n=ansible | changed: [localhost -> compute-0(192.168.25.248)] => (item=compute-0) 2025-12-01 06:54:11,573 p=32065 u=zuul n=ansible | changed: [localhost -> compute-1(192.168.25.231)] => (item=compute-1) 2025-12-01 06:54:12,124 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=crc) 2025-12-01 06:54:12,406 p=32065 u=zuul n=ansible | changed: [localhost -> controller(192.168.25.58)] => (item=controller) 2025-12-01 06:54:12,549 p=32065 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-12-01 06:54:12,550 p=32065 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-12-01 06:54:12,558 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-12-01 06:54:12,558 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:12 +0000 (0:00:01.357) 0:02:10.073 ******* 2025-12-01 06:54:12,558 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:12 +0000 (0:00:01.357) 0:02:10.072 ******* 2025-12-01 06:54:12,590 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:12,597 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-12-01 06:54:12,597 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:12 +0000 (0:00:00.039) 0:02:10.113 ******* 2025-12-01 06:54:12,597 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:12 +0000 (0:00:00.039) 0:02:10.111 ******* 2025-12-01 06:54:13,211 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:13,218 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-12-01 06:54:13,219 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:13 +0000 (0:00:00.621) 0:02:10.734 ******* 2025-12-01 06:54:13,219 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:13 +0000 (0:00:00.621) 0:02:10.733 ******* 2025-12-01 06:54:13,247 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-12-01 06:54:13,257 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-12-01 06:54:13,257 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:13 +0000 (0:00:00.038) 0:02:10.773 ******* 2025-12-01 06:54:13,258 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:13 +0000 (0:00:00.038) 0:02:10.771 ******* 2025-12-01 06:54:13,645 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=1) 2025-12-01 06:54:13,971 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=2) 2025-12-01 06:54:14,287 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=3) 2025-12-01 06:54:14,607 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=4) 2025-12-01 06:54:14,922 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=5) 2025-12-01 06:54:15,231 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=6) 2025-12-01 06:54:15,540 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=7) 2025-12-01 06:54:15,841 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=8) 2025-12-01 06:54:16,155 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=9) 2025-12-01 06:54:16,467 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=10) 2025-12-01 06:54:16,778 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=11) 2025-12-01 06:54:17,082 p=32065 u=zuul n=ansible | changed: [localhost -> crc(192.168.25.48)] => (item=12) 2025-12-01 06:54:17,093 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-12-01 06:54:17,094 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:17 +0000 (0:00:03.836) 0:02:14.609 ******* 2025-12-01 06:54:17,094 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:17 +0000 (0:00:03.836) 0:02:14.608 ******* 2025-12-01 06:54:17,444 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:17,452 p=32065 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-12-01 06:54:17,452 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:17 +0000 (0:00:00.358) 0:02:14.967 ******* 2025-12-01 06:54:17,452 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:17 +0000 (0:00:00.358) 0:02:14.966 ******* 2025-12-01 06:54:18,172 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:18,187 p=32065 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-12-01 06:54:18,187 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.735) 0:02:15.703 ******* 2025-12-01 06:54:18,188 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.735) 0:02:15.701 ******* 2025-12-01 06:54:18,249 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:18,255 p=32065 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-12-01 06:54:18,255 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.067) 0:02:15.770 ******* 2025-12-01 06:54:18,255 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.067) 0:02:15.769 ******* 2025-12-01 06:54:18,375 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-12-01 06:54:18,376 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.120) 0:02:15.891 ******* 2025-12-01 06:54:18,376 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.120) 0:02:15.890 ******* 2025-12-01 06:54:18,397 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:18,405 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-12-01 06:54:18,405 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.029) 0:02:15.920 ******* 2025-12-01 06:54:18,405 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.029) 0:02:15.919 ******* 2025-12-01 06:54:18,432 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:54:18,440 p=32065 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-12-01 06:54:18,440 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.034) 0:02:15.955 ******* 2025-12-01 06:54:18,440 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.034) 0:02:15.954 ******* 2025-12-01 06:54:18,459 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:18,467 p=32065 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-12-01 06:54:18,467 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.027) 0:02:15.982 ******* 2025-12-01 06:54:18,467 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.027) 0:02:15.981 ******* 2025-12-01 06:54:18,506 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-12-01 06:54:18,507 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.039) 0:02:16.022 ******* 2025-12-01 06:54:18,507 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.039) 0:02:16.021 ******* 2025-12-01 06:54:18,530 p=32065 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-01 06:54:18,537 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-12-01 06:54:18,537 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.030) 0:02:16.053 ******* 2025-12-01 06:54:18,538 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.030) 0:02:16.051 ******* 2025-12-01 06:54:18,556 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:18,563 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-12-01 06:54:18,563 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.025) 0:02:16.079 ******* 2025-12-01 06:54:18,563 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:18 +0000 (0:00:00.025) 0:02:16.077 ******* 2025-12-01 06:54:18,609 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run.log 2025-12-01 06:54:19,474 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-12-01 06:54:19,476 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:54:19,489 p=32065 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-12-01 06:54:19,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.925) 0:02:17.004 ******* 2025-12-01 06:54:19,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.925) 0:02:17.003 ******* 2025-12-01 06:54:19,536 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-12-01 06:54:19,536 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.046) 0:02:17.051 ******* 2025-12-01 06:54:19,536 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.046) 0:02:17.050 ******* 2025-12-01 06:54:19,562 p=32065 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-01 06:54:19,569 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-12-01 06:54:19,569 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.033) 0:02:17.084 ******* 2025-12-01 06:54:19,569 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.033) 0:02:17.083 ******* 2025-12-01 06:54:19,589 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:54:19,597 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-12-01 06:54:19,597 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.027) 0:02:17.112 ******* 2025-12-01 06:54:19,597 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:54:19 +0000 (0:00:00.027) 0:02:17.111 ******* 2025-12-01 06:54:19,640 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2025-12-01 06:56:12,474 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-12-01 06:56:12,476 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:56:12,489 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-12-01 06:56:12,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:12 +0000 (0:01:52.892) 0:04:10.004 ******* 2025-12-01 06:56:12,489 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:12 +0000 (0:01:52.892) 0:04:10.003 ******* 2025-12-01 06:56:42,988 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:56:42,994 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-12-01 06:56:42,994 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:42 +0000 (0:00:30.505) 0:04:40.510 ******* 2025-12-01 06:56:42,994 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:42 +0000 (0:00:30.505) 0:04:40.508 ******* 2025-12-01 06:56:43,344 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:56:43,351 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-12-01 06:56:43,351 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:43 +0000 (0:00:00.356) 0:04:40.867 ******* 2025-12-01 06:56:43,351 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:43 +0000 (0:00:00.356) 0:04:40.865 ******* 2025-12-01 06:56:44,125 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:56:44,133 p=32065 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-12-01 06:56:44,133 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.781) 0:04:41.648 ******* 2025-12-01 06:56:44,133 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.781) 0:04:41.647 ******* 2025-12-01 06:56:44,180 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-12-01 06:56:44,181 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.047) 0:04:41.696 ******* 2025-12-01 06:56:44,181 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.047) 0:04:41.695 ******* 2025-12-01 06:56:44,204 p=32065 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-01 06:56:44,210 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-12-01 06:56:44,211 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.029) 0:04:41.726 ******* 2025-12-01 06:56:44,211 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.029) 0:04:41.724 ******* 2025-12-01 06:56:44,229 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:56:44,236 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-12-01 06:56:44,236 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.025) 0:04:41.751 ******* 2025-12-01 06:56:44,236 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:56:44 +0000 (0:00:00.025) 0:04:41.750 ******* 2025-12-01 06:56:44,277 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run_openstack.log 2025-12-01 06:57:53,145 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-12-01 06:57:53,146 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:53,158 p=32065 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-12-01 06:57:53,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:01:08.922) 0:05:50.674 ******* 2025-12-01 06:57:53,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:01:08.922) 0:05:50.672 ******* 2025-12-01 06:57:53,177 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:57:53,183 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-12-01 06:57:53,183 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.024) 0:05:50.698 ******* 2025-12-01 06:57:53,183 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.024) 0:05:50.697 ******* 2025-12-01 06:57:53,200 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:57:53,206 p=32065 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-12-01 06:57:53,206 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.023) 0:05:50.722 ******* 2025-12-01 06:57:53,206 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.023) 0:05:50.720 ******* 2025-12-01 06:57:53,249 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-12-01 06:57:53,249 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.042) 0:05:50.765 ******* 2025-12-01 06:57:53,249 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.042) 0:05:50.763 ******* 2025-12-01 06:57:53,271 p=32065 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-01 06:57:53,278 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-12-01 06:57:53,278 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.028) 0:05:50.793 ******* 2025-12-01 06:57:53,278 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.028) 0:05:50.792 ******* 2025-12-01 06:57:53,294 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:57:53,300 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-12-01 06:57:53,301 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.022) 0:05:50.816 ******* 2025-12-01 06:57:53,301 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:53 +0000 (0:00:00.022) 0:05:50.814 ******* 2025-12-01 06:57:53,340 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack_deploy.log 2025-12-01 06:57:54,187 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-12-01 06:57:54,188 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:54,200 p=32065 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-12-01 06:57:54,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.899) 0:05:51.716 ******* 2025-12-01 06:57:54,200 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.899) 0:05:51.714 ******* 2025-12-01 06:57:54,250 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-12-01 06:57:54,250 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.049) 0:05:51.765 ******* 2025-12-01 06:57:54,250 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.049) 0:05:51.764 ******* 2025-12-01 06:57:54,273 p=32065 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-01 06:57:54,280 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-12-01 06:57:54,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.029) 0:05:51.795 ******* 2025-12-01 06:57:54,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.029) 0:05:51.794 ******* 2025-12-01 06:57:54,297 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:57:54,304 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-12-01 06:57:54,304 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.024) 0:05:51.819 ******* 2025-12-01 06:57:54,304 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:54 +0000 (0:00:00.024) 0:05:51.818 ******* 2025-12-01 06:57:54,344 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_netconfig.log 2025-12-01 06:57:57,283 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-12-01 06:57:57,285 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:57,297 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2025-12-01 06:57:57,297 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:02.993) 0:05:54.812 ******* 2025-12-01 06:57:57,297 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:02.993) 0:05:54.811 ******* 2025-12-01 06:57:57,326 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2025-12-01 06:57:57,342 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2025-12-01 06:57:57,342 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.045) 0:05:54.858 ******* 2025-12-01 06:57:57,342 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.045) 0:05:54.856 ******* 2025-12-01 06:57:57,360 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:57:57,367 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2025-12-01 06:57:57,367 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.024) 0:05:54.882 ******* 2025-12-01 06:57:57,367 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.024) 0:05:54.881 ******* 2025-12-01 06:57:57,384 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 06:57:57,390 p=32065 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2025-12-01 06:57:57,391 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.023) 0:05:54.906 ******* 2025-12-01 06:57:57,391 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.023) 0:05:54.904 ******* 2025-12-01 06:57:57,436 p=32065 u=zuul n=ansible | TASK [update_containers : Destination directory exists state=directory, recurse=True, path={{ cifmw_update_containers_dest_path | dirname }}] *** 2025-12-01 06:57:57,436 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.045) 0:05:54.951 ******* 2025-12-01 06:57:57,436 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:57 +0000 (0:00:00.045) 0:05:54.950 ******* 2025-12-01 06:57:58,293 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:57:58,300 p=32065 u=zuul n=ansible | TASK [update_containers : Generate update containers yaml file src=update_containers.j2, dest={{ cifmw_update_containers_dest_path }}, mode=0644] *** 2025-12-01 06:57:58,300 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.863) 0:05:55.815 ******* 2025-12-01 06:57:58,300 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.863) 0:05:55.814 ******* 2025-12-01 06:57:58,659 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:58,666 p=32065 u=zuul n=ansible | TASK [update_containers : Update the containers _raw_params=oc apply -f {{ cifmw_update_containers_dest_path }}] *** 2025-12-01 06:57:58,666 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.366) 0:05:56.182 ******* 2025-12-01 06:57:58,666 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.366) 0:05:56.180 ******* 2025-12-01 06:57:58,935 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:58,948 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2025-12-01 06:57:58,948 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.281) 0:05:56.463 ******* 2025-12-01 06:57:58,948 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.281) 0:05:56.462 ******* 2025-12-01 06:57:58,970 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:57:58,982 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-12-01 06:57:58,983 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.034) 0:05:56.498 ******* 2025-12-01 06:57:58,983 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:58 +0000 (0:00:00.034) 0:05:56.496 ******* 2025-12-01 06:57:59,787 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:57:59,795 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2025-12-01 06:57:59,796 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:59 +0000 (0:00:00.813) 0:05:57.311 ******* 2025-12-01 06:57:59,796 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:59 +0000 (0:00:00.813) 0:05:57.310 ******* 2025-12-01 06:57:59,827 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: os**********et cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: os**********et designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: os**********et dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: os**********et storageRequest: 10G openstack-cell1: replicas: 1 secret: os**********et storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: os**********et storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: true template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: customServiceConfig: |- [DEFAULT] debug=true vlan_transparent = true global_physnet_mtu = 1400 [ovn] ovn_emit_need_to_frag = true [ml2] path_mtu = 1400 [ovs] igmp_snooping_enable=True databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: os**********et storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: os**********et enabled: false heatInstance: heat ceilometer: enabled: true secret: os**********et cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: '2024-11-18' version: v13 secret: name: logging-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: persistent: pvcStorageRequest: 10G retention: 24h strategy: persistent 2025-12-01 06:57:59,835 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2025-12-01 06:57:59,835 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:59 +0000 (0:00:00.039) 0:05:57.350 ******* 2025-12-01 06:57:59,835 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:57:59 +0000 (0:00:00.039) 0:05:57.349 ******* 2025-12-01 06:57:59,916 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_apply_the.log 2025-12-01 06:58:00,107 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 06:58:00,114 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2025-12-01 06:58:00,114 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:58:00 +0000 (0:00:00.278) 0:05:57.629 ******* 2025-12-01 06:58:00,114 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:58:00 +0000 (0:00:00.278) 0:05:57.628 ******* 2025-12-01 06:58:00,133 p=32065 u=zuul n=ansible | Pausing for 30 seconds 2025-12-01 06:58:30,164 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 06:58:30,172 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2025-12-01 06:58:30,172 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:58:30 +0000 (0:00:30.057) 0:06:27.687 ******* 2025-12-01 06:58:30,172 p=32065 u=zuul n=ansible | Monday 01 December 2025 06:58:30 +0000 (0:00:30.057) 0:06:27.686 ******* 2025-12-01 07:03:21,377 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:21,383 p=32065 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2025-12-01 07:03:21,383 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:04:51.211) 0:11:18.899 ******* 2025-12-01 07:03:21,383 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:04:51.211) 0:11:18.897 ******* 2025-12-01 07:03:21,451 p=32065 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2025-12-01 07:03:21,451 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.067) 0:11:18.966 ******* 2025-12-01 07:03:21,451 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.067) 0:11:18.965 ******* 2025-12-01 07:03:21,745 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:21,752 p=32065 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2025-12-01 07:03:21,752 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.301) 0:11:19.268 ******* 2025-12-01 07:03:21,752 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.301) 0:11:19.266 ******* 2025-12-01 07:03:21,777 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:21,784 p=32065 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2025-12-01 07:03:21,784 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.031) 0:11:19.299 ******* 2025-12-01 07:03:21,784 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:21 +0000 (0:00:00.031) 0:11:19.298 ******* 2025-12-01 07:03:22,117 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:22,124 p=32065 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-12-01 07:03:22,124 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.340) 0:11:19.640 ******* 2025-12-01 07:03:22,124 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.340) 0:11:19.638 ******* 2025-12-01 07:03:22,277 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:22,284 p=32065 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2025-12-01 07:03:22,284 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.159) 0:11:19.799 ******* 2025-12-01 07:03:22,284 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.159) 0:11:19.798 ******* 2025-12-01 07:03:22,325 p=32065 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-12-01 07:03:22,325 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.041) 0:11:19.841 ******* 2025-12-01 07:03:22,325 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.041) 0:11:19.839 ******* 2025-12-01 07:03:22,503 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:22,510 p=32065 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-12-01 07:03:22,510 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.184) 0:11:20.025 ******* 2025-12-01 07:03:22,510 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.184) 0:11:20.024 ******* 2025-12-01 07:03:22,529 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:22,537 p=32065 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-12-01 07:03:22,537 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.026) 0:11:20.052 ******* 2025-12-01 07:03:22,537 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.026) 0:11:20.051 ******* 2025-12-01 07:03:22,556 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:22,564 p=32065 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-12-01 07:03:22,564 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.027) 0:11:20.079 ******* 2025-12-01 07:03:22,564 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.027) 0:11:20.078 ******* 2025-12-01 07:03:22,942 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:22,948 p=32065 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-12-01 07:03:22,948 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.384) 0:11:20.464 ******* 2025-12-01 07:03:22,949 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:22 +0000 (0:00:00.384) 0:11:20.462 ******* 2025-12-01 07:03:24,149 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:24,168 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2025-12-01 07:03:24,168 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:01.219) 0:11:21.683 ******* 2025-12-01 07:03:24,168 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:01.219) 0:11:21.682 ******* 2025-12-01 07:03:24,422 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:24,429 p=32065 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2025-12-01 07:03:24,429 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.261) 0:11:21.944 ******* 2025-12-01 07:03:24,429 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.261) 0:11:21.943 ******* 2025-12-01 07:03:24,767 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:24,779 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:03:24,779 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.349) 0:11:22.294 ******* 2025-12-01 07:03:24,779 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.349) 0:11:22.293 ******* 2025-12-01 07:03:24,827 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:24,833 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:03:24,834 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.054) 0:11:22.349 ******* 2025-12-01 07:03:24,834 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.054) 0:11:22.347 ******* 2025-12-01 07:03:24,942 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:24,950 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:03:24,950 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.116) 0:11:22.466 ******* 2025-12-01 07:03:24,951 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:24 +0000 (0:00:00.116) 0:11:22.464 ******* 2025-12-01 07:03:25,123 p=32065 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}) 2025-12-01 07:03:25,134 p=32065 u=zuul n=ansible | TASK [run_hook : Set playbook path for Tune rabbitmq resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-12-01 07:03:25,134 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.183) 0:11:22.649 ******* 2025-12-01 07:03:25,134 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.183) 0:11:22.648 ******* 2025-12-01 07:03:25,176 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,183 p=32065 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-12-01 07:03:25,184 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.049) 0:11:22.699 ******* 2025-12-01 07:03:25,184 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.049) 0:11:22.698 ******* 2025-12-01 07:03:25,346 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,354 p=32065 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-12-01 07:03:25,354 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.170) 0:11:22.869 ******* 2025-12-01 07:03:25,354 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.170) 0:11:22.868 ******* 2025-12-01 07:03:25,375 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:25,381 p=32065 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-12-01 07:03:25,381 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.027) 0:11:22.897 ******* 2025-12-01 07:03:25,381 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.027) 0:11:22.895 ******* 2025-12-01 07:03:25,539 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,546 p=32065 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-12-01 07:03:25,546 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.164) 0:11:23.061 ******* 2025-12-01 07:03:25,546 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.164) 0:11:23.060 ******* 2025-12-01 07:03:25,568 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,575 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-12-01 07:03:25,575 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.028) 0:11:23.090 ******* 2025-12-01 07:03:25,575 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.028) 0:11:23.089 ******* 2025-12-01 07:03:25,730 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,737 p=32065 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-01 07:03:25,737 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.162) 0:11:23.252 ******* 2025-12-01 07:03:25,737 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.162) 0:11:23.251 ******* 2025-12-01 07:03:25,894 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:25,903 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Tune rabbitmq resources] ************* 2025-12-01 07:03:25,903 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.166) 0:11:23.418 ******* 2025-12-01 07:03:25,903 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:25 +0000 (0:00:00.166) 0:11:23.417 ******* 2025-12-01 07:03:25,952 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_run_hook_without_retry_tune.log 2025-12-01 07:03:27,992 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:28,000 p=32065 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Tune rabbitmq resources] **************** 2025-12-01 07:03:28,000 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:27 +0000 (0:00:02.097) 0:11:25.516 ******* 2025-12-01 07:03:28,001 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:27 +0000 (0:00:02.097) 0:11:25.514 ******* 2025-12-01 07:03:28,024 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,031 p=32065 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 07:03:28,031 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:25.546 ******* 2025-12-01 07:03:28,031 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:25.545 ******* 2025-12-01 07:03:28,180 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:28,188 p=32065 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-01 07:03:28,188 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.156) 0:11:25.703 ******* 2025-12-01 07:03:28,188 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.156) 0:11:25.702 ******* 2025-12-01 07:03:28,208 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,221 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 07:03:28,221 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.033) 0:11:25.736 ******* 2025-12-01 07:03:28,221 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.033) 0:11:25.735 ******* 2025-12-01 07:03:28,265 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:28,274 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2025-12-01 07:03:28,274 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.052) 0:11:25.789 ******* 2025-12-01 07:03:28,274 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.052) 0:11:25.788 ******* 2025-12-01 07:03:28,294 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,302 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2025-12-01 07:03:28,302 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.817 ******* 2025-12-01 07:03:28,302 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.816 ******* 2025-12-01 07:03:28,322 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,330 p=32065 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2025-12-01 07:03:28,330 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.845 ******* 2025-12-01 07:03:28,330 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.844 ******* 2025-12-01 07:03:28,351 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,359 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2025-12-01 07:03:28,359 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.874 ******* 2025-12-01 07:03:28,359 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.873 ******* 2025-12-01 07:03:28,380 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,387 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2025-12-01 07:03:28,387 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.903 ******* 2025-12-01 07:03:28,387 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:25.901 ******* 2025-12-01 07:03:28,407 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,414 p=32065 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2025-12-01 07:03:28,414 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.930 ******* 2025-12-01 07:03:28,415 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.928 ******* 2025-12-01 07:03:28,434 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,442 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations={% if content_provider_registry_ip is defined or not cifmw_edpm_deploy_baremetal_bootc %} apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %} {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-12-01 07:03:28,442 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.958 ******* 2025-12-01 07:03:28,442 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:25.956 ******* 2025-12-01 07:03:28,462 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,469 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2025-12-01 07:03:28,469 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:25.984 ******* 2025-12-01 07:03:28,469 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:25.983 ******* 2025-12-01 07:03:28,491 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,498 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2025-12-01 07:03:28,498 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:26.013 ******* 2025-12-01 07:03:28,498 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.028) 0:11:26.012 ******* 2025-12-01 07:03:28,518 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,524 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-12-01 07:03:28,524 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.040 ******* 2025-12-01 07:03:28,525 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.038 ******* 2025-12-01 07:03:28,544 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,551 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-12-01 07:03:28,551 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.066 ******* 2025-12-01 07:03:28,551 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.065 ******* 2025-12-01 07:03:28,570 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,577 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-12-01 07:03:28,577 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.093 ******* 2025-12-01 07:03:28,577 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.091 ******* 2025-12-01 07:03:28,597 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,604 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-12-01 07:03:28,604 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.119 ******* 2025-12-01 07:03:28,604 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.118 ******* 2025-12-01 07:03:28,624 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,631 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2025-12-01 07:03:28,631 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.146 ******* 2025-12-01 07:03:28,631 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.145 ******* 2025-12-01 07:03:28,650 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,657 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2025-12-01 07:03:28,658 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.173 ******* 2025-12-01 07:03:28,658 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.172 ******* 2025-12-01 07:03:28,677 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,684 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2025-12-01 07:03:28,684 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.200 ******* 2025-12-01 07:03:28,685 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.198 ******* 2025-12-01 07:03:28,704 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,711 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2025-12-01 07:03:28,711 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.226 ******* 2025-12-01 07:03:28,711 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.225 ******* 2025-12-01 07:03:28,733 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,742 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2025-12-01 07:03:28,742 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:26.257 ******* 2025-12-01 07:03:28,742 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:26.256 ******* 2025-12-01 07:03:28,762 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,769 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2025-12-01 07:03:28,769 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.284 ******* 2025-12-01 07:03:28,769 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.026) 0:11:26.283 ******* 2025-12-01 07:03:28,789 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,796 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2025-12-01 07:03:28,796 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:26.311 ******* 2025-12-01 07:03:28,796 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:26.310 ******* 2025-12-01 07:03:28,816 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,823 p=32065 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-12-01 07:03:28,823 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:26.338 ******* 2025-12-01 07:03:28,823 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.027) 0:11:26.337 ******* 2025-12-01 07:03:28,860 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,873 p=32065 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 07:03:28,873 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.050) 0:11:26.388 ******* 2025-12-01 07:03:28,873 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.050) 0:11:26.387 ******* 2025-12-01 07:03:28,920 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:28,928 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2025-12-01 07:03:28,928 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.054) 0:11:26.443 ******* 2025-12-01 07:03:28,928 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.054) 0:11:26.442 ******* 2025-12-01 07:03:28,951 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:28,958 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2025-12-01 07:03:28,958 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:26.474 ******* 2025-12-01 07:03:28,959 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:28 +0000 (0:00:00.030) 0:11:26.472 ******* 2025-12-01 07:03:28,995 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2025-12-01 07:03:29,003 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2025-12-01 07:03:29,011 p=32065 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2025-12-01 07:03:29,011 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,018 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2025-12-01 07:03:29,018 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.059) 0:11:26.534 ******* 2025-12-01 07:03:29,018 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.059) 0:11:26.532 ******* 2025-12-01 07:03:29,042 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,049 p=32065 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2025-12-01 07:03:29,049 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.030) 0:11:26.564 ******* 2025-12-01 07:03:29,049 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.030) 0:11:26.563 ******* 2025-12-01 07:03:29,073 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,081 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2025-12-01 07:03:29,081 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.031) 0:11:26.596 ******* 2025-12-01 07:03:29,081 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.031) 0:11:26.595 ******* 2025-12-01 07:03:29,111 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,117 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2025-12-01 07:03:29,117 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.036) 0:11:26.633 ******* 2025-12-01 07:03:29,118 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.036) 0:11:26.631 ******* 2025-12-01 07:03:29,143 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,151 p=32065 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2025-12-01 07:03:29,151 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.033) 0:11:26.666 ******* 2025-12-01 07:03:29,151 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.033) 0:11:26.665 ******* 2025-12-01 07:03:29,174 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,186 p=32065 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2025-12-01 07:03:29,186 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.035) 0:11:26.701 ******* 2025-12-01 07:03:29,186 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.035) 0:11:26.700 ******* 2025-12-01 07:03:29,207 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,215 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-12-01 07:03:29,215 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.028) 0:11:26.730 ******* 2025-12-01 07:03:29,215 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.028) 0:11:26.729 ******* 2025-12-01 07:03:29,245 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:29,252 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-12-01 07:03:29,252 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.037) 0:11:26.767 ******* 2025-12-01 07:03:29,252 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.037) 0:11:26.766 ******* 2025-12-01 07:03:29,586 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:29,593 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-12-01 07:03:29,593 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.341) 0:11:27.108 ******* 2025-12-01 07:03:29,593 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.341) 0:11:27.107 ******* 2025-12-01 07:03:29,624 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:03:29,630 p=32065 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-12-01 07:03:29,630 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.037) 0:11:27.146 ******* 2025-12-01 07:03:29,631 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.037) 0:11:27.144 ******* 2025-12-01 07:03:29,671 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2025-12-01 07:03:29,672 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.041) 0:11:27.187 ******* 2025-12-01 07:03:29,672 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.041) 0:11:27.186 ******* 2025-12-01 07:03:29,698 p=32065 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: fa2bb8efef6782c26ea7f1675eeb36dd DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 2 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw 2025-12-01 07:03:29,705 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2025-12-01 07:03:29,705 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.033) 0:11:27.220 ******* 2025-12-01 07:03:29,705 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.033) 0:11:27.219 ******* 2025-12-01 07:03:29,726 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:03:29,734 p=32065 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2025-12-01 07:03:29,734 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.029) 0:11:27.249 ******* 2025-12-01 07:03:29,734 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:29 +0000 (0:00:00.029) 0:11:27.248 ******* 2025-12-01 07:03:29,781 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_edpm_deploy.log 2025-12-01 07:03:39,364 p=32065 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2025-12-01 07:03:39,366 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:39,379 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-12-01 07:03:39,379 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:09.644) 0:11:36.894 ******* 2025-12-01 07:03:39,379 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:09.644) 0:11:36.893 ******* 2025-12-01 07:03:39,653 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:39,661 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-12-01 07:03:39,662 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:00.282) 0:11:37.177 ******* 2025-12-01 07:03:39,662 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:00.282) 0:11:37.175 ******* 2025-12-01 07:03:39,694 p=32065 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 1.1.1.1 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 enable_debug: false gather_facts: false image_prefix: openstack image_tag: fa2bb8efef6782c26ea7f1675eeb36dd neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2025-12-01 07:03:39,701 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-12-01 07:03:39,701 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:00.039) 0:11:37.216 ******* 2025-12-01 07:03:39,701 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:39 +0000 (0:00:00.039) 0:11:37.215 ******* 2025-12-01 07:03:40,350 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:40,358 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-12-01 07:03:40,358 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:40 +0000 (0:00:00.657) 0:11:37.874 ******* 2025-12-01 07:03:40,358 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:40 +0000 (0:00:00.657) 0:11:37.872 ******* 2025-12-01 07:03:41,652 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:41,660 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-12-01 07:03:41,660 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:41 +0000 (0:00:01.301) 0:11:39.175 ******* 2025-12-01 07:03:41,660 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:41 +0000 (0:00:01.301) 0:11:39.174 ******* 2025-12-01 07:03:42,272 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:03:42,280 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-12-01 07:03:42,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:42 +0000 (0:00:00.619) 0:11:39.795 ******* 2025-12-01 07:03:42,280 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:03:42 +0000 (0:00:00.619) 0:11:39.794 ******* 2025-12-01 07:22:20,299 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:20,306 p=32065 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2025-12-01 07:22:20,306 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:20 +0000 (0:18:38.026) 0:30:17.821 ******* 2025-12-01 07:22:20,306 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:20 +0000 (0:18:38.026) 0:30:17.820 ******* 2025-12-01 07:22:20,347 p=32065 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_nova_manage_discover.log 2025-12-01 07:22:23,366 p=32065 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:23,374 p=32065 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2025-12-01 07:22:23,374 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:03.068) 0:30:20.889 ******* 2025-12-01 07:22:23,374 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:03.068) 0:30:20.888 ******* 2025-12-01 07:22:23,397 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:23,435 p=32065 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2025-12-01 07:22:23,452 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-01 07:22:23,452 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.077) 0:30:20.967 ******* 2025-12-01 07:22:23,452 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.077) 0:30:20.966 ******* 2025-12-01 07:22:23,467 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,473 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Install required packages name=['nfs-utils', 'iptables']] **** 2025-12-01 07:22:23,473 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:20.988 ******* 2025-12-01 07:22:23,473 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:20.987 ******* 2025-12-01 07:22:23,486 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,492 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Configure nfs to use v4 only path=/etc/nfs.conf, section=nfsd, option=vers3, value=n, backup=True, mode=0644] *** 2025-12-01 07:22:23,492 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.008 ******* 2025-12-01 07:22:23,493 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.006 ******* 2025-12-01 07:22:23,506 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,513 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Disable NFSv3-related services name={{ item }}, masked=True] *** 2025-12-01 07:22:23,513 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.020) 0:30:21.029 ******* 2025-12-01 07:22:23,513 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.020) 0:30:21.027 ******* 2025-12-01 07:22:23,529 p=32065 u=zuul n=ansible | skipping: [compute-0] => (item=rpc-statd.service) 2025-12-01 07:22:23,532 p=32065 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.service) 2025-12-01 07:22:23,534 p=32065 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.socket) 2025-12-01 07:22:23,535 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,541 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Ensure shared folder exist path=/data/{{ item }}, state=directory, mode=755] *** 2025-12-01 07:22:23,541 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.027) 0:30:21.057 ******* 2025-12-01 07:22:23,541 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.027) 0:30:21.055 ******* 2025-12-01 07:22:23,555 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,561 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Set nfs network vars _raw_params=oc get ipset {{ _nfs_host }} -n {{ _ipset_namespace }} -o jsonpath='{.status.reservations[?(@.network=="{{ _nfs_network_name }}")]}'] *** 2025-12-01 07:22:23,561 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.077 ******* 2025-12-01 07:22:23,561 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.075 ******* 2025-12-01 07:22:23,577 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,583 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Store nfs network vars dest={{ cifmw_basedir }}/artifacts/parameters/nfs-params.yml, content={{ { 'cifmw_nfs_ip': cifmw_nfs_network_out.stdout | from_json | json_query('address'), 'cifmw_nfs_network_range': cifmw_nfs_network_out.stdout | from_json | json_query('cidr') } | to_nice_yaml }}, mode=0644] *** 2025-12-01 07:22:23,583 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.022) 0:30:21.099 ******* 2025-12-01 07:22:23,583 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.022) 0:30:21.097 ******* 2025-12-01 07:22:23,599 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,605 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Generate nftables rules file content=add rule inet filter EDPM_INPUT tcp dport 2049 accept , dest={{ nftables_path }}/nfs-server.nft, mode=0666] *** 2025-12-01 07:22:23,605 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:21.120 ******* 2025-12-01 07:22:23,605 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:21.119 ******* 2025-12-01 07:22:23,618 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,626 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Update nftables.conf and include nfs rules at the bottom path={{ nftables_conf }}, line=include "{{ nftables_path }}/nfs-server.nft", insertafter=EOF] *** 2025-12-01 07:22:23,626 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.020) 0:30:21.141 ******* 2025-12-01 07:22:23,626 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.020) 0:30:21.140 ******* 2025-12-01 07:22:23,639 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,645 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Restart nftables service name=nftables, state=restarted] ***** 2025-12-01 07:22:23,645 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.160 ******* 2025-12-01 07:22:23,645 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.159 ******* 2025-12-01 07:22:23,658 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,664 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Configure the ip the nfs server should listen on path=/etc/nfs.conf, section=nfsd, option=host, value={{ cifmw_nfs_network_out.stdout | from_json | json_query('address') }}, backup=True, mode=0644] *** 2025-12-01 07:22:23,664 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.179 ******* 2025-12-01 07:22:23,664 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.178 ******* 2025-12-01 07:22:23,677 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,683 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Enable and restart nfs-server service name=nfs-server, state=restarted, enabled=True] *** 2025-12-01 07:22:23,683 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.018) 0:30:21.198 ******* 2025-12-01 07:22:23,683 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.019) 0:30:21.197 ******* 2025-12-01 07:22:23,696 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,702 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Add shares to /etc/exports path=/etc/exports, line=/data/{{ item }} {{ cifmw_nfs_network_out.stdout | from_json | json_query('cidr') }}(rw,sync,no_root_squash)] *** 2025-12-01 07:22:23,702 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.018) 0:30:21.217 ******* 2025-12-01 07:22:23,702 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.018) 0:30:21.216 ******* 2025-12-01 07:22:23,715 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,723 p=32065 u=zuul n=ansible | TASK [cifmw_nfs : Export the shares _raw_params=exportfs -a] ******************* 2025-12-01 07:22:23,723 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:21.238 ******* 2025-12-01 07:22:23,723 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.021) 0:30:21.237 ******* 2025-12-01 07:22:23,736 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,765 p=32065 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2025-12-01 07:22:23,789 p=32065 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-12-01 07:22:23,789 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.066) 0:30:21.304 ******* 2025-12-01 07:22:23,789 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.066) 0:30:21.303 ******* 2025-12-01 07:22:23,799 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,840 p=32065 u=zuul n=ansible | TASK [Clear ceph target hosts facts _raw_params=clear_facts] ******************* 2025-12-01 07:22:23,840 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.051) 0:30:21.356 ******* 2025-12-01 07:22:23,840 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.051) 0:30:21.354 ******* 2025-12-01 07:22:23,847 p=32065 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 07:22:23,885 p=32065 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2025-12-01 07:22:23,900 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:23,900 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.059) 0:30:21.415 ******* 2025-12-01 07:22:23,900 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.059) 0:30:21.414 ******* 2025-12-01 07:22:23,940 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:23,947 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:23,947 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.047) 0:30:21.462 ******* 2025-12-01 07:22:23,947 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:23 +0000 (0:00:00.047) 0:30:21.461 ******* 2025-12-01 07:22:24,012 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:24,019 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:24,019 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.071) 0:30:21.534 ******* 2025-12-01 07:22:24,019 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.071) 0:30:21.533 ******* 2025-12-01 07:22:24,082 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,110 p=32065 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2025-12-01 07:22:24,137 p=32065 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2025-12-01 07:22:24,137 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.117) 0:30:21.652 ******* 2025-12-01 07:22:24,137 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.117) 0:30:21.651 ******* 2025-12-01 07:22:24,152 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,158 p=32065 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2025-12-01 07:22:24,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.021) 0:30:21.673 ******* 2025-12-01 07:22:24,158 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.021) 0:30:21.672 ******* 2025-12-01 07:22:24,173 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,180 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:24,180 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.021) 0:30:21.695 ******* 2025-12-01 07:22:24,180 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.021) 0:30:21.694 ******* 2025-12-01 07:22:24,222 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:24,229 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:24,229 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.049) 0:30:21.744 ******* 2025-12-01 07:22:24,229 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.049) 0:30:21.743 ******* 2025-12-01 07:22:24,298 p=32065 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:24,306 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:24,306 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.077) 0:30:21.821 ******* 2025-12-01 07:22:24,306 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.077) 0:30:21.820 ******* 2025-12-01 07:22:24,371 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,384 p=32065 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2025-12-01 07:22:24,384 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.077) 0:30:21.899 ******* 2025-12-01 07:22:24,384 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.077) 0:30:21.898 ******* 2025-12-01 07:22:24,400 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,411 p=32065 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:24,411 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.027) 0:30:21.926 ******* 2025-12-01 07:22:24,411 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.027) 0:30:21.925 ******* 2025-12-01 07:22:24,424 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,430 p=32065 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:24,430 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.018) 0:30:21.945 ******* 2025-12-01 07:22:24,430 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.018) 0:30:21.944 ******* 2025-12-01 07:22:24,442 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,450 p=32065 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:24,450 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.019) 0:30:21.965 ******* 2025-12-01 07:22:24,450 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.019) 0:30:21.964 ******* 2025-12-01 07:22:24,517 p=32065 u=zuul n=ansible | skipping: [localhost] => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2025-12-01 07:22:24,519 p=32065 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:24,530 p=32065 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2025-12-01 07:22:24,530 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.080) 0:30:22.045 ******* 2025-12-01 07:22:24,530 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.080) 0:30:22.044 ******* 2025-12-01 07:22:24,538 p=32065 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-12-01 07:22:24,538 p=32065 u=zuul n=ansible | compute-0 : ok=0 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 2025-12-01 07:22:24,538 p=32065 u=zuul n=ansible | localhost : ok=211 changed=77 unreachable=0 failed=0 skipped=154 rescued=0 ignored=0 2025-12-01 07:22:24,538 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.007) 0:30:22.053 ******* 2025-12-01 07:22:24,538 p=32065 u=zuul n=ansible | =============================================================================== 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ----- 1118.03s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 291.21s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 112.89s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------- 68.92s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 30.51s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.06s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 29.51s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 25.53s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 11.82s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_prep ------------------------------ 9.64s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 8.49s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters --- 8.04s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.94s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 3.84s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped --- 3.07s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 2.99s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 2.24s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | run_hook : Run hook without retry - Tune rabbitmq resources ------------- 2.10s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | discover_latest_image : Get latest image -------------------------------- 1.54s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | repo_setup : Get repo-setup repository ---------------------------------- 1.45s 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | Monday 01 December 2025 07:22:24 +0000 (0:00:00.009) 0:30:22.053 ******* 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | =============================================================================== 2025-12-01 07:22:24,539 p=32065 u=zuul n=ansible | edpm_deploy ---------------------------------------------------------- 1124.53s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | edpm_prepare ---------------------------------------------------------- 355.26s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 196.62s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | run_hook --------------------------------------------------------------- 47.81s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 33.32s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 17.89s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 15.87s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ci_local_storage -------------------------------------------------------- 8.70s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 4.54s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | install_ca -------------------------------------------------------------- 3.29s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | openshift_login --------------------------------------------------------- 2.88s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 2.47s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 1.80s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 1.57s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | update_containers ------------------------------------------------------- 1.51s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | install_openstack_ca ---------------------------------------------------- 0.87s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 0.86s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | edpm_deploy_baremetal --------------------------------------------------- 0.60s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | cifmw_nfs --------------------------------------------------------------- 0.34s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.29s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.26s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 0.26s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.23s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ansible.builtin.meta ---------------------------------------------------- 0.12s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.06s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.05s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.02s 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2025-12-01 07:22:24,540 p=32065 u=zuul n=ansible | total ---------------------------------------------------------------- 1822.02s 2025-12-01 07:22:26,045 p=37141 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2025-12-01 07:22:26,078 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:26,078 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.036) 0:00:00.036 ******* 2025-12-01 07:22:26,078 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.036) 0:00:00.036 ******* 2025-12-01 07:22:26,125 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:26,133 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:26,133 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.055) 0:00:00.092 ******* 2025-12-01 07:22:26,133 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.055) 0:00:00.091 ******* 2025-12-01 07:22:26,195 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:26,203 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:26,203 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.070) 0:00:00.162 ******* 2025-12-01 07:22:26,203 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.070) 0:00:00.161 ******* 2025-12-01 07:22:26,264 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:26,279 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-01 07:22:26,280 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.076) 0:00:00.238 ******* 2025-12-01 07:22:26,280 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.076) 0:00:00.238 ******* 2025-12-01 07:22:26,311 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:26,322 p=37141 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2025-12-01 07:22:26,322 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.042) 0:00:00.280 ******* 2025-12-01 07:22:26,322 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:26 +0000 (0:00:00.042) 0:00:00.280 ******* 2025-12-01 07:22:29,380 p=37141 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2025-12-01 07:22:29,395 p=37141 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2025-12-01 07:22:29,395 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:29 +0000 (0:00:03.072) 0:00:03.353 ******* 2025-12-01 07:22:29,395 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:29 +0000 (0:00:03.072) 0:00:03.353 ******* 2025-12-01 07:22:31,862 p=37141 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2025-12-01 07:22:33,840 p=37141 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2025-12-01 07:22:33,854 p=37141 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2025-12-01 07:22:33,854 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:33 +0000 (0:00:04.459) 0:00:07.813 ******* 2025-12-01 07:22:33,855 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:33 +0000 (0:00:04.459) 0:00:07.812 ******* 2025-12-01 07:22:35,853 p=37141 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2025-12-01 07:22:35,864 p=37141 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-12-01 07:22:35,864 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:35 +0000 (0:00:02.009) 0:00:09.823 ******* 2025-12-01 07:22:35,864 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:35 +0000 (0:00:02.009) 0:00:09.822 ******* 2025-12-01 07:22:35,927 p=37141 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2025-12-01 07:22:35,937 p=37141 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-12-01 07:22:35,937 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:35 +0000 (0:00:00.072) 0:00:09.896 ******* 2025-12-01 07:22:35,937 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:35 +0000 (0:00:00.072) 0:00:09.895 ******* 2025-12-01 07:22:38,436 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:38,446 p=37141 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-12-01 07:22:38,446 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:38 +0000 (0:00:02.508) 0:00:12.404 ******* 2025-12-01 07:22:38,446 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:38 +0000 (0:00:02.508) 0:00:12.404 ******* 2025-12-01 07:22:38,530 p=37141 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2025-12-01 07:22:38,540 p=37141 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-12-01 07:22:38,540 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:38 +0000 (0:00:00.094) 0:00:12.499 ******* 2025-12-01 07:22:38,540 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:38 +0000 (0:00:00.094) 0:00:12.498 ******* 2025-12-01 07:22:41,985 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:41,993 p=37141 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-12-01 07:22:41,993 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:41 +0000 (0:00:03.453) 0:00:15.952 ******* 2025-12-01 07:22:41,994 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:41 +0000 (0:00:03.453) 0:00:15.951 ******* 2025-12-01 07:22:42,084 p=37141 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2025-12-01 07:22:42,094 p=37141 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-12-01 07:22:42,094 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:42 +0000 (0:00:00.100) 0:00:16.053 ******* 2025-12-01 07:22:42,095 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:42 +0000 (0:00:00.101) 0:00:16.052 ******* 2025-12-01 07:22:46,902 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:46,918 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:46,918 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:46 +0000 (0:00:04.823) 0:00:20.877 ******* 2025-12-01 07:22:46,918 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:46 +0000 (0:00:04.823) 0:00:20.876 ******* 2025-12-01 07:22:46,972 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:46,981 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:46,981 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:46 +0000 (0:00:00.063) 0:00:20.940 ******* 2025-12-01 07:22:46,981 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:46 +0000 (0:00:00.063) 0:00:20.939 ******* 2025-12-01 07:22:47,051 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:47,061 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:47,061 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.079) 0:00:21.019 ******* 2025-12-01 07:22:47,061 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.079) 0:00:21.019 ******* 2025-12-01 07:22:47,130 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,155 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:47,156 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.094) 0:00:21.114 ******* 2025-12-01 07:22:47,156 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.095) 0:00:21.114 ******* 2025-12-01 07:22:47,213 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:47,223 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:47,223 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.067) 0:00:21.182 ******* 2025-12-01 07:22:47,223 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.067) 0:00:21.181 ******* 2025-12-01 07:22:47,313 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:47,323 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:47,323 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.100) 0:00:21.282 ******* 2025-12-01 07:22:47,324 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.100) 0:00:21.281 ******* 2025-12-01 07:22:47,424 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,465 p=37141 u=zuul n=ansible | TASK [test_operator : Cleanup previous test-operator resources _raw_params=cleanup.yaml] *** 2025-12-01 07:22:47,465 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.141) 0:00:21.423 ******* 2025-12-01 07:22:47,465 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.141) 0:00:21.423 ******* 2025-12-01 07:22:47,486 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,495 p=37141 u=zuul n=ansible | TASK [test_operator : Ensure test_operator folder exists path={{ cifmw_test_operator_artifacts_basedir }}, state=directory, mode=0755, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2025-12-01 07:22:47,495 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.030) 0:00:21.454 ******* 2025-12-01 07:22:47,495 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.030) 0:00:21.453 ******* 2025-12-01 07:22:47,746 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:47,756 p=37141 u=zuul n=ansible | TASK [test_operator : Get openstack-operator csv information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, label_selectors=['operators.coreos.com/openstack-operator.openstack-operators'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-12-01 07:22:47,756 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.260) 0:00:21.714 ******* 2025-12-01 07:22:47,756 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.260) 0:00:21.714 ******* 2025-12-01 07:22:47,779 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,789 p=37141 u=zuul n=ansible | TASK [test_operator : Get full name of openstack-operator CSV openstack_operator_csv_name={{ csv_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-12-01 07:22:47,789 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.747 ******* 2025-12-01 07:22:47,789 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.747 ******* 2025-12-01 07:22:47,813 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,822 p=37141 u=zuul n=ansible | TASK [test_operator : Get index of test-operator image _raw_params=set -o pipefail; oc get ClusterServiceVersion {{ openstack_operator_csv_name }} -o json | jq '.spec.install.spec.deployments[0].spec.template.spec.containers[0].env | to_entries[] | select(.value.name == "RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL").key'] *** 2025-12-01 07:22:47,822 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.780 ******* 2025-12-01 07:22:47,822 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.780 ******* 2025-12-01 07:22:47,845 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,855 p=37141 u=zuul n=ansible | TASK [test_operator : Patch test-operator version in CSV kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, namespace={{ cifmw_test_operator_controller_namespace }}, name={{ openstack_operator_csv_name }}, patch=[{'path': '/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/{{ image_index.stdout }}/value', 'value': '{{ cifmw_test_operator_bundle }}', 'op': 'replace'}]] *** 2025-12-01 07:22:47,855 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.032) 0:00:21.813 ******* 2025-12-01 07:22:47,855 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.032) 0:00:21.813 ******* 2025-12-01 07:22:47,878 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,888 p=37141 u=zuul n=ansible | TASK [test_operator : Get test-operator-controller-manager pod information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Pod, label_selectors=['control-plane=controller-manager', 'openstack.org/operator-name=test'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-12-01 07:22:47,888 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.846 ******* 2025-12-01 07:22:47,888 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.846 ******* 2025-12-01 07:22:47,912 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,921 p=37141 u=zuul n=ansible | TASK [test_operator : Get full name of test-operator-controller-manager pod test_operator_controller_name={{ pod_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-12-01 07:22:47,921 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.032) 0:00:21.879 ******* 2025-12-01 07:22:47,921 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.032) 0:00:21.879 ******* 2025-12-01 07:22:47,944 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,952 p=37141 u=zuul n=ansible | TASK [test_operator : Wait until the test-operator-controller-manager is reloaded kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ cifmw_test_operator_controller_namespace }}, kind=Pod] *** 2025-12-01 07:22:47,952 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.031) 0:00:21.911 ******* 2025-12-01 07:22:47,953 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.031) 0:00:21.910 ******* 2025-12-01 07:22:47,976 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:47,986 p=37141 u=zuul n=ansible | TASK [test_operator : Delete CRDs created by test-operator kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=CustomResourceDefinition, state=absent, api_version=v1, name={{ item }}, namespace={{ cifmw_test_operator_namespace }}, wait=True, wait_timeout=600] *** 2025-12-01 07:22:47,986 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.945 ******* 2025-12-01 07:22:47,986 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:47 +0000 (0:00:00.033) 0:00:21.944 ******* 2025-12-01 07:22:48,015 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=tempests.test.openstack.org) 2025-12-01 07:22:48,021 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=tobikoes.test.openstack.org) 2025-12-01 07:22:48,027 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=ansibletests.test.openstack.org) 2025-12-01 07:22:48,032 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=horizontests.test.openstack.org) 2025-12-01 07:22:48,033 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,042 p=37141 u=zuul n=ansible | TASK [test_operator : Clone test-operator repository and checkout into specified version repo=https://github.com/openstack-k8s-operators/test-operator.git, dest=/tmp/test-operator, refspec=+refs/pull/*:refs/heads/*, version={{ cifmw_test_operator_version }}, force=True] *** 2025-12-01 07:22:48,042 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.055) 0:00:22.000 ******* 2025-12-01 07:22:48,042 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.055) 0:00:22.000 ******* 2025-12-01 07:22:48,065 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,073 p=37141 u=zuul n=ansible | TASK [test_operator : Run make generate manifests install from /tmp/test-operator dir chdir=/tmp/test-operator, _raw_params=set -o pipefail; make generate manifests install] *** 2025-12-01 07:22:48,074 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.031) 0:00:22.032 ******* 2025-12-01 07:22:48,074 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.031) 0:00:22.032 ******* 2025-12-01 07:22:48,099 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,109 p=37141 u=zuul n=ansible | TASK [test_operator : Call test stages loop _raw_params=stages.yml] ************ 2025-12-01 07:22:48,109 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.035) 0:00:22.067 ******* 2025-12-01 07:22:48,109 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.035) 0:00:22.067 ******* 2025-12-01 07:22:48,154 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/stages.yml for localhost => (item={'name': 'tempest', 'type': 'tempest'}) 2025-12-01 07:22:48,165 p=37141 u=zuul n=ansible | TASK [test_operator : Run stage tempest msg=Run stage {{ _stage_vars.name }}] *** 2025-12-01 07:22:48,165 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.056) 0:00:22.124 ******* 2025-12-01 07:22:48,165 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.056) 0:00:22.123 ******* 2025-12-01 07:22:48,186 p=37141 u=zuul n=ansible | ok: [localhost] => msg: Run stage tempest 2025-12-01 07:22:48,195 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 07:22:48,195 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.153 ******* 2025-12-01 07:22:48,195 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.153 ******* 2025-12-01 07:22:48,218 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,227 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 07:22:48,227 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.032) 0:00:22.186 ******* 2025-12-01 07:22:48,227 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.032) 0:00:22.185 ******* 2025-12-01 07:22:48,250 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,261 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_test_hooks _raw_params={{ hook.type }}.yml] *** 2025-12-01 07:22:48,261 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.034) 0:00:22.220 ******* 2025-12-01 07:22:48,261 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.034) 0:00:22.219 ******* 2025-12-01 07:22:48,330 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:48,346 p=37141 u=zuul n=ansible | TASK [test_operator : Set empty stage vars dict stage_vars_dict={}] ************ 2025-12-01 07:22:48,346 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.085) 0:00:22.305 ******* 2025-12-01 07:22:48,347 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.085) 0:00:22.304 ******* 2025-12-01 07:22:48,367 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:48,375 p=37141 u=zuul n=ansible | TASK [test_operator : Include stage var file file={{ _stage_vars.test_vars_file | default('/dev/null') }}, name=_stage_var_file] *** 2025-12-01 07:22:48,376 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.334 ******* 2025-12-01 07:22:48,376 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.334 ******* 2025-12-01 07:22:48,395 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:48,404 p=37141 u=zuul n=ansible | TASK [test_operator : Merge file vars and test vars _stage_test_vars={{ file_vars | combine(test_vars) }}] *** 2025-12-01 07:22:48,404 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.028) 0:00:22.363 ******* 2025-12-01 07:22:48,404 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.028) 0:00:22.362 ******* 2025-12-01 07:22:48,425 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:48,433 p=37141 u=zuul n=ansible | TASK [test_operator : Overwrite global_vars with stage_vars stage_vars_dict={{ stage_vars_dict | combine({item.key: _stage_test_vars[item.key] | default(lookup('vars', item.key, default=omit)) }) }}] *** 2025-12-01 07:22:48,433 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.392 ******* 2025-12-01 07:22:48,433 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:48 +0000 (0:00:00.029) 0:00:22.391 ******* 2025-12-01 07:22:48,472 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_stages', 'value': [{'name': 'tempest', 'type': 'tempest'}]}) 2025-12-01 07:22:48,478 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_on_test_failure', 'value': True}) 2025-12-01 07:22:48,487 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_artifacts_basedir', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/tests/test_operator"}) 2025-12-01 07:22:48,494 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_namespace', 'value': 'openstack'}) 2025-12-01 07:22:48,501 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_namespace', 'value': 'openstack-operators'}) 2025-12-01 07:22:48,507 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_bundle', 'value': ''}) 2025-12-01 07:22:48,514 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_timeout', 'value': 14400}) 2025-12-01 07:22:48,520 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_logs_image', 'value': 'quay.io/quay/busybox'}) 2025-12-01 07:22:48,527 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_cleanup', 'value': False}) 2025-12-01 07:22:48,533 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_clean_last_run', 'value': False}) 2025-12-01 07:22:48,540 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_dry_run', 'value': False}) 2025-12-01 07:22:48,547 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_groups', 'value': ['default']}) 2025-12-01 07:22:48,553 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_jobs', 'value': ['default']}) 2025-12-01 07:22:48,560 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_fast', 'value': False}) 2025-12-01 07:22:48,567 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class_prefix', 'value': "{{ 'lvms-' if cifmw_use_lvms | default(false) | bool else '' }}"}) 2025-12-01 07:22:48,575 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class', 'value': '{{ cifmw_test_operator_storage_class_prefix }}local-storage'}) 2025-12-01 07:22:48,582 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_delete_logs_pod', 'value': False}) 2025-12-01 07:22:48,588 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_privileged', 'value': True}) 2025-12-01 07:22:48,595 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_selinux_level', 'value': 's0:c478,c978'}) 2025-12-01 07:22:48,604 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crs_path', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/test-operator-crs"}) 2025-12-01 07:22:48,611 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_log_pod_definition', 'value': {'apiVersion': 'v1', 'kind': 'Pod', 'metadata': {'name': 'test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'containers': [{'name': 'test-operator-logs-container', 'image': '{{ cifmw_test_operator_logs_image }}', 'command': ['sleep'], 'args': ['infinity'], 'volumeMounts': '{{ _test_operator_volume_mounts }}'}], 'volumes': '{{ _test_operator_volumes }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2025-12-01 07:22:48,618 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_registry', 'value': 'quay.io'}) 2025-12-01 07:22:48,624 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_namespace', 'value': 'podified-antelope-centos9'}) 2025-12-01 07:22:48,631 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_image_tag', 'value': 'current-podified'}) 2025-12-01 07:22:48,637 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_name', 'value': 'tempest-tests'}) 2025-12-01 07:22:48,644 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_concurrency', 'value': 6}) 2025-12-01 07:22:48,651 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_registry', 'value': '{{ cifmw_update_containers_registry }}'}) 2025-12-01 07:22:48,658 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_namespace', 'value': '{{ cifmw_update_containers_org }}'}) 2025-12-01 07:22:48,664 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_container', 'value': 'openstack-tempest-all'}) 2025-12-01 07:22:48,672 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tempest_registry }}/{{ stage_vars_dict.cifmw_test_operator_tempest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tempest_container }}'}) 2025-12-01 07:22:48,679 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image_tag', 'value': '{{ cifmw_repo_setup_full_hash }}'}) 2025-12-01 07:22:48,685 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_network_attachments', 'value': ['ctlplane']}) 2025-12-01 07:22:48,692 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_include_override_scenario', 'value': False}) 2025-12-01 07:22:48,698 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_exclude_override_scenario', 'value': False}) 2025-12-01 07:22:48,706 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_workflow', 'value': [{'stepName': 'multi-thread-testing', 'tempestRun': {'concurrency': 6, 'excludeList': 'test_multicast.*ext*\ntest_multicast.*restart\n^neutron_.*plugin..*scenario.test_.*macvtap\n# remove when bug OSPRH-11751 resolved\nvlan_transparent_allowed_address_pairs\nvlan_transparent_port_sec_disabled\nvlan_transparent_packet_length_greater_mtu\n', 'includeList': '# neutron whitebox multi-thread tests\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n'}}, {'stepName': 'single-thread-testing', 'tempestRun': {'concurrency': 1, 'excludeList': '# remove when this job use openstackclient version bigger than in antelope branch (no more releases)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_ports.PortListLongOptSGsCmd\n# remove when this job use neutron version bigger than antelope (LP#2110018 supported in 2025.1)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_south_north\n# remove when bug OSPRH-9569 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_metadata_rate_limiting\n# remove traffic logging tests when OSPRH-9203 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_only_dropped_traffic_logged\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_.*accepted_traffic_logged\n# neutron whitebox multi-thread tests (executed on different workflow step)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n', 'includeList': '^whitebox_neutron_tempest_plugin.*\n^neutron_.*plugin..*scenario.test_.*macvtap\n'}}]}) 2025-12-01 07:22:48,712 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_cleanup', 'value': False}) 2025-12-01 07:22:48,719 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_failed_tests', 'value': False}) 2025-12-01 07:22:48,726 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_override_status', 'value': False}) 2025-12-01 07:22:48,733 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_resources', 'value': {'requests': {}, 'limits': {}}}) 2025-12-01 07:22:48,739 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_debug', 'value': False}) 2025-12-01 07:22:48,765 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tempest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tempest_image }}:{{ stage_vars_dict.cifmw_test_operator_tempest_image_tag }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'parallel': '{{ stage_vars_dict.cifmw_test_operator_tempest_parallel | default(omit) }}', 'SSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_tempest_ssh_key_secret_name | default(omit) }}', 'configOverwrite': '{{ stage_vars_dict.cifmw_test_operator_tempest_config_overwrite | default(omit) }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tempest_network_attachments }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_configmaps_mounts | default(omit) }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tempest_resources | default(omit) }}', 'tempestRun': {'includeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_include_list | default('') }}\n", 'excludeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_exclude_list | default('') }}\n", 'expectedFailuresList': "{{ stage_vars_dict.cifmw_test_operator_tempest_expected_failures_list | default('') }}\n", 'concurrency': '{{ stage_vars_dict.cifmw_test_operator_tempest_concurrency }}', 'externalPlugin': '{{ stage_vars_dict.cifmw_test_operator_tempest_external_plugin | default([]) }}', 'extraRPMs': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_rpms | default([]) }}', 'extraImages': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_images | default([]) }}'}, 'tempestconfRun': '{{ cifmw_tempest_tempestconf_config_defaults | combine(stage_vars_dict.cifmw_test_operator_tempest_tempestconf_config | default({})) }}', 'cleanup': '{{ stage_vars_dict.cifmw_test_operator_tempest_cleanup | bool }}', 'rerunFailedTests': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_failed_tests | bool }}', 'rerunOverrideStatus': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_override_status | bool }}', 'timingDataUrl': '{{ stage_vars_dict.cifmw_test_operator_tempest_timing_data_url | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tempest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tempest_debug }}'}}}) 2025-12-01 07:22:48,772 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_name', 'value': 'tobiko-tests'}) 2025-12-01 07:22:48,780 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-12-01 07:22:48,787 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-12-01 07:22:48,794 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_container', 'value': 'openstack-tobiko'}) 2025-12-01 07:22:48,802 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tobiko_registry }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_container }}'}) 2025-12-01 07:22:48,810 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-12-01 07:22:48,817 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_testenv', 'value': 'scenario'}) 2025-12-01 07:22:48,824 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_version', 'value': 'master'}) 2025-12-01 07:22:48,831 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_pytest_addopts', 'value': None}) 2025-12-01 07:22:48,838 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_prevent_create', 'value': None}) 2025-12-01 07:22:48,845 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_num_processes', 'value': None}) 2025-12-01 07:22:48,852 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_advanced_image_url', 'value': 'https://github.com/openstack-k8s-operators/openstack-k8s-operators-ci/releases/download/v1.0.0/tobiko-custom-v1.0.0.qcow2'}) 2025-12-01 07:22:48,859 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_override_conf', 'value': {}}) 2025-12-01 07:22:48,866 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kubeconfig_secret', 'value': 'tobiko-secret'}) 2025-12-01 07:22:48,873 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_openstack_cmd', 'value': 'oc -n openstack exec openstackclient -- openstack'}) 2025-12-01 07:22:48,880 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_cleanup', 'value': False}) 2025-12-01 07:22:48,888 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keytype', 'value': "{{ cifmw_ssh_keytype | default('ecdsa') }}"}) 2025-12-01 07:22:48,895 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keysize', 'value': '{{ cifmw_ssh_keysize | default(521) }}'}) 2025-12-01 07:22:48,903 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_debug', 'value': False}) 2025-12-01 07:22:48,910 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_network_attachments', 'value': []}) 2025-12-01 07:22:48,917 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_workflow', 'value': []}) 2025-12-01 07:22:48,937 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tobiko', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tobiko_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'kubeconfigSecretName': '{{ stage_vars_dict.cifmw_test_operator_tobiko_kubeconfig_secret }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tobiko_image }}:{{ stage_vars_dict.cifmw_test_operator_tobiko_image_tag }}', 'testenv': '{{ stage_vars_dict.cifmw_test_operator_tobiko_testenv }}', 'version': '{{ stage_vars_dict.cifmw_test_operator_tobiko_version }}', 'patch': '{{ stage_vars_dict.cifmw_test_operator_tobiko_patch | default(omit) }}', 'pytestAddopts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts if stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts is not none else omit }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tobiko_debug }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tobiko_network_attachments }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tobiko_resources | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tobiko_workflow }}'}}}) 2025-12-01 07:22:48,943 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_name', 'value': 'ansibletest'}) 2025-12-01 07:22:48,951 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-12-01 07:22:48,959 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-12-01 07:22:48,966 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_container', 'value': 'openstack-ansible-tests'}) 2025-12-01 07:22:48,974 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_registry }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_container }}'}) 2025-12-01 07:22:48,981 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-12-01 07:22:48,989 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_compute_ssh_key_secret_name', 'value': 'dataplane-ansible-ssh-private-key-secret'}) 2025-12-01 07:22:48,996 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workload_ssh_key_secret_name', 'value': ''}) 2025-12-01 07:22:49,003 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_git_repo', 'value': ''}) 2025-12-01 07:22:49,010 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_playbook_path', 'value': ''}) 2025-12-01 07:22:49,017 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_collection', 'value': ''}) 2025-12-01 07:22:49,025 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_var_files', 'value': ''}) 2025-12-01 07:22:49,032 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_extra_vars', 'value': ''}) 2025-12-01 07:22:49,039 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_inventory', 'value': ''}) 2025-12-01 07:22:49,101 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_map', 'value': 'openstack-config'}) 2025-12-01 07:22:49,103 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_secret', 'value': 'openstack-config-secret'}) 2025-12-01 07:22:49,104 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_debug', 'value': False}) 2025-12-01 07:22:49,105 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workflow', 'value': []}) 2025-12-01 07:22:49,106 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_extra_configmaps_mounts', 'value': []}) 2025-12-01 07:22:49,107 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'AnsibleTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_image }}:{{ stage_vars_dict.cifmw_test_operator_ansibletest_image_tag }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_configmaps_mounts }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_mounts | default(omit) }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'computeSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_compute_ssh_key_secret_name }}', 'workloadSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workload_ssh_key_secret_name }}', 'ansibleGitRepo': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_git_repo }}', 'ansiblePlaybookPath': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_playbook_path }}', 'ansibleCollections': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_collection }}', 'ansibleVarFiles': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_var_files }}', 'ansibleExtraVars': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_extra_vars }}', 'ansibleInventory': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_inventory }}', 'openStackConfigMap': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_map }}', 'openStackConfigSecret': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_secret }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_debug }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2025-12-01 07:22:49,108 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_name', 'value': 'horizontest-tests'}) 2025-12-01 07:22:49,111 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-12-01 07:22:49,119 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-12-01 07:22:49,127 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_container', 'value': 'openstack-horizontest'}) 2025-12-01 07:22:49,135 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_horizontest_registry }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_container }}'}) 2025-12-01 07:22:49,143 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-12-01 07:22:49,150 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_username', 'value': 'admin'}) 2025-12-01 07:22:49,203 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_password', 'value': '12345678'}) 2025-12-01 07:22:49,212 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_dashboard_url', 'value': 'https://horizon-openstack.apps.ocp.openstack.lab/'}) 2025-12-01 07:22:49,219 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_auth_url', 'value': 'https://keystone-public-openstack.apps.ocp.openstack.lab'}) 2025-12-01 07:22:49,227 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_repo_url', 'value': 'https://review.opendev.org/openstack/horizon'}) 2025-12-01 07:22:49,234 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_repo_branch', 'value': 'master'}) 2025-12-01 07:22:49,242 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_url', 'value': 'http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img'}) 2025-12-01 07:22:49,249 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name', 'value': 'horizontest'}) 2025-12-01 07:22:49,257 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_user', 'value': 'horizontest'}) 2025-12-01 07:22:49,264 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_password', 'value': 'horizontest'}) 2025-12-01 07:22:49,271 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_flavor_name', 'value': 'm1.tiny'}) 2025-12-01 07:22:49,279 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_logs_directory_name', 'value': 'horizon'}) 2025-12-01 07:22:49,287 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_debug', 'value': False}) 2025-12-01 07:22:49,294 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_test_dir', 'value': '/var/lib/horizontest'}) 2025-12-01 07:22:49,301 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_extra_flag', 'value': 'not pagination'}) 2025-12-01 07:22:49,309 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name_xpath', 'value': "//span[@class='rcueicon rcueicon-folder-open']/ancestor::li"}) 2025-12-01 07:22:49,334 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'HorizonTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_horizontest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image }}:{{ stage_vars_dict.cifmw_test_operator_horizontest_image_tag }}', 'adminUsername': '{{ stage_vars_dict.cifmw_test_operator_horizontest_admin_username }}', 'adminPassword': '{{**********}}', 'dashboardUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_dashboard_url }}', 'authUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_auth_url }}', 'repoUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_repo_url }}', 'horizonRepoBranch': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_repo_branch }}', 'imageUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image_url }}', 'projectName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name }}', 'user': '{{ stage_vars_dict.cifmw_test_operator_horizontest_user }}', 'password': '{{**********}}', 'flavorName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_flavor_name }}', 'logsDirectoryName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_logs_directory_name }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_horizontest_debug }}', 'extraFlag': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_flag }}', 'projectNameXpath': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name_xpath }}', 'horizonTestDir': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_test_dir }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_horizontest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2025-12-01 07:22:49,342 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_extra_images', 'value': [{'ID': '11111111-1111-1111-1111-111111111111', 'URL': 'https://chandankumar.fedorapeople.org/rocky9_latest_neutron_whitebox.qcow2', 'diskFormat': 'qcow2', 'flavor': {'ID': '22222222-2222-2222-2222-222222222222', 'RAM': 1024, 'disk': 10, 'name': 'custom_neutron_guest', 'vcpus': 1}, 'name': 'custom_neutron_guest'}]}) 2025-12-01 07:22:49,350 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tempestconf_config', 'value': {'overrides': "compute-feature-enabled.vnc_console true\ncompute-feature-enabled.cold_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nnetwork-feature-enabled.port_security true\nneutron_plugin_options.advanced_image_ssh_user rocky\nneutron_plugin_options.available_type_drivers geneve\nneutron_plugin_options.create_shared_resources true\nneutron_plugin_options.is_igmp_snooping_enabled true\nneutron_plugin_options.ipv6_metadata false\nneutron_plugin_options.advanced_image_ref 11111111-1111-1111-1111-111111111111\nneutron_plugin_options.advanced_image_flavor_ref 22222222-2222-2222-2222-222222222222\nwhitebox_neutron_plugin_options.kubeconfig_path '/home/zuul/.crc/machines/crc/kubeconfig'\nvalidation.allowed_network_downtime 15\nvalidation.run_validation true\nidentity.v3_endpoint_type public\nidentity.v2_admin_endpoint_type public\n"}}) 2025-12-01 07:22:49,358 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_secret_name', 'value': 'test-operator-controller-priv-key'}) 2025-12-01 07:22:49,365 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_file_path', 'value': '~/.ssh/id_cifw'}) 2025-12-01 07:22:49,373 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_kind_name', 'value': 'Tempest'}) 2025-12-01 07:22:49,380 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kind_name', 'value': 'Tobiko'}) 2025-12-01 07:22:49,388 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_kind_name', 'value': 'AnsibleTest'}) 2025-12-01 07:22:49,396 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_kind_name', 'value': 'HorizonTest'}) 2025-12-01 07:22:49,403 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crd_group', 'value': 'test.openstack.org'}) 2025-12-01 07:22:49,411 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_crd_name', 'value': 'tempests.{{ cifmw_test_operator_crd_group }}'}) 2025-12-01 07:22:49,420 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_crd_name', 'value': 'tobikoes.{{ cifmw_test_operator_crd_group }}'}) 2025-12-01 07:22:49,428 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_crd_name', 'value': 'ansibletests.{{ cifmw_test_operator_crd_group }}'}) 2025-12-01 07:22:49,436 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_crd_name', 'value': 'horizontests.{{ cifmw_test_operator_crd_group }}'}) 2025-12-01 07:22:49,443 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_name', 'value': 'test-operator-controller-manager'}) 2025-12-01 07:22:49,452 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_default_conf', 'value': {'DEFAULT': {'log_dir': '/var/lib/tobiko/tobiko', 'log_file': 'tobiko.log', 'debug': True}, 'testcase': {'timeout': 1800.0, 'test_runner_timeout': 14400.0}, 'advanced_vm': {'username': 'fedora', 'image_url': '{{ cifmw_test_operator_tobiko_advanced_image_url }}'}, 'keystone': {'interface': 'public'}, 'manila': {'share_protocol': 'cephfs'}}}) 2025-12-01 07:22:49,464 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_include_list', 'value': 'tempest.scenario.test_network_basic_ops.TestNetworkBasicOps\n'}) 2025-12-01 07:22:49,536 p=37141 u=zuul n=ansible | TASK [test_operator : Override specific type config stage_vars_dict={{ stage_vars_dict | combine({_stage_config: _stage_test_vars[_stage_config] | default(lookup('vars', _stage_config, default=omit)) }) }}] *** 2025-12-01 07:22:49,536 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:01.102) 0:00:23.494 ******* 2025-12-01 07:22:49,536 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:01.102) 0:00:23.494 ******* 2025-12-01 07:22:49,591 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:49,604 p=37141 u=zuul n=ansible | TASK [test_operator : Call runner tempest _raw_params=runners/{{ _stage_vars.type }}_runner.yml] *** 2025-12-01 07:22:49,604 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.067) 0:00:23.562 ******* 2025-12-01 07:22:49,604 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.067) 0:00:23.562 ******* 2025-12-01 07:22:49,635 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/runners/tempest_runner.yml for localhost 2025-12-01 07:22:49,652 p=37141 u=zuul n=ansible | TASK [test_operator : Run tempest job _raw_params=run-test-operator-job.yml] *** 2025-12-01 07:22:49,653 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.048) 0:00:23.611 ******* 2025-12-01 07:22:49,653 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.048) 0:00:23.611 ******* 2025-12-01 07:22:49,691 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/run-test-operator-job.yml for localhost 2025-12-01 07:22:49,703 p=37141 u=zuul n=ansible | TASK [test_operator : Set variable containing the test-operator CR test_operator_cr={{ test_operator_config }}] *** 2025-12-01 07:22:49,703 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.050) 0:00:23.661 ******* 2025-12-01 07:22:49,703 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.050) 0:00:23.661 ******* 2025-12-01 07:22:49,728 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:49,739 p=37141 u=zuul n=ansible | TASK [test_operator : Prepare test configuration - tempest _raw_params={{ test_operator_config_playbook }}] *** 2025-12-01 07:22:49,739 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.036) 0:00:23.698 ******* 2025-12-01 07:22:49,739 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.036) 0:00:23.697 ******* 2025-12-01 07:22:49,785 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/tempest-tests.yml for localhost 2025-12-01 07:22:49,803 p=37141 u=zuul n=ansible | TASK [test_operator : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2025-12-01 07:22:49,803 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.063) 0:00:23.762 ******* 2025-12-01 07:22:49,803 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.063) 0:00:23.761 ******* 2025-12-01 07:22:49,828 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:49,838 p=37141 u=zuul n=ansible | TASK [test_operator : Get list of tests to be executed yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_test_operator_default_groups }}, job={{ cifmw_test_operator_instance_name | default(omit) }}] *** 2025-12-01 07:22:49,838 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.034) 0:00:23.797 ******* 2025-12-01 07:22:49,838 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.034) 0:00:23.796 ******* 2025-12-01 07:22:49,863 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:49,874 p=37141 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'includeList': allowed_tests }}}, recursive=true) }}] *** 2025-12-01 07:22:49,874 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.035) 0:00:23.832 ******* 2025-12-01 07:22:49,874 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.035) 0:00:23.832 ******* 2025-12-01 07:22:49,898 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:49,907 p=37141 u=zuul n=ansible | TASK [test_operator : Copy list_skipped to artifacts dir dest={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml, mode=0644] *** 2025-12-01 07:22:49,908 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.033) 0:00:23.866 ******* 2025-12-01 07:22:49,908 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:49 +0000 (0:00:00.033) 0:00:23.866 ******* 2025-12-01 07:22:50,502 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:50,512 p=37141 u=zuul n=ansible | TASK [test_operator : Get list of tests to be excluded yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_test_operator_default_jobs }}] *** 2025-12-01 07:22:50,513 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.604) 0:00:24.471 ******* 2025-12-01 07:22:50,513 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.605) 0:00:24.471 ******* 2025-12-01 07:22:50,948 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:50,958 p=37141 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'excludeList': skipped_tests }}}, recursive=true) }}] *** 2025-12-01 07:22:50,958 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.445) 0:00:24.916 ******* 2025-12-01 07:22:50,958 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.445) 0:00:24.916 ******* 2025-12-01 07:22:50,989 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:50,998 p=37141 u=zuul n=ansible | TASK [test_operator : Check that cifmw private key file exists path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2025-12-01 07:22:50,998 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.040) 0:00:24.957 ******* 2025-12-01 07:22:50,999 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:50 +0000 (0:00:00.040) 0:00:24.956 ******* 2025-12-01 07:22:51,165 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:51,173 p=37141 u=zuul n=ansible | TASK [test_operator : Slurp cifmw private key file path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2025-12-01 07:22:51,174 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:51 +0000 (0:00:00.175) 0:00:25.132 ******* 2025-12-01 07:22:51,174 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:51 +0000 (0:00:00.175) 0:00:25.132 ******* 2025-12-01 07:22:51,415 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:51,426 p=37141 u=zuul n=ansible | TASK [test_operator : Ensure a secret for the cifmw private key file exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, wait=True, definition={'apiVersion': 'v1', 'kind': 'Secret', 'type': 'Opaque', 'metadata': {'name': '{{ cifmw_test_operator_controller_priv_key_secret_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'data': {'ssh-privatekey': '{{ private_key_file_content.content }}'}}] *** 2025-12-01 07:22:51,426 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:51 +0000 (0:00:00.252) 0:00:25.385 ******* 2025-12-01 07:22:51,426 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:51 +0000 (0:00:00.252) 0:00:25.384 ******* 2025-12-01 07:22:52,211 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:52,221 p=37141 u=zuul n=ansible | TASK [test_operator : Add SSHKeySecretName section to Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'SSHKeySecretName': cifmw_test_operator_controller_priv_key_secret_name }}, recursive=true) }}] *** 2025-12-01 07:22:52,221 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.795) 0:00:26.180 ******* 2025-12-01 07:22:52,221 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.795) 0:00:26.179 ******* 2025-12-01 07:22:52,261 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:52,272 p=37141 u=zuul n=ansible | TASK [test_operator : Add controller IP to the overrides section in Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestconfRun': {'overrides': (test_operator_cr.spec.tempestconfRun.overrides | default('')) + ' ' + 'whitebox_neutron_plugin_options.proxy_host_address ' + controller_ip }}}, recursive=true) }}] *** 2025-12-01 07:22:52,272 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.050) 0:00:26.230 ******* 2025-12-01 07:22:52,272 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.050) 0:00:26.230 ******* 2025-12-01 07:22:52,304 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:52,314 p=37141 u=zuul n=ansible | TASK [test_operator : Add controller IP to each workflow step overrides section - Create overriden_workflow overriden_workflow={{ overriden_workflow | default([]) + [_overriden_workflow_step] }}] *** 2025-12-01 07:22:52,314 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.042) 0:00:26.272 ******* 2025-12-01 07:22:52,314 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.042) 0:00:26.272 ******* 2025-12-01 07:22:52,371 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'multi-thread-testing', 'tempestRun': {'concurrency': 6, 'excludeList': 'test_multicast.*ext*\ntest_multicast.*restart\n^neutron_.*plugin..*scenario.test_.*macvtap\n# remove when bug OSPRH-11751 resolved\nvlan_transparent_allowed_address_pairs\nvlan_transparent_port_sec_disabled\nvlan_transparent_packet_length_greater_mtu\n', 'includeList': '# neutron whitebox multi-thread tests\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n'}}) 2025-12-01 07:22:52,391 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'single-thread-testing', 'tempestRun': {'concurrency': 1, 'excludeList': '# remove when this job use openstackclient version bigger than in antelope branch (no more releases)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_ports.PortListLongOptSGsCmd\n# remove when this job use neutron version bigger than antelope (LP#2110018 supported in 2025.1)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_south_north\n# remove when bug OSPRH-9569 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_metadata_rate_limiting\n# remove traffic logging tests when OSPRH-9203 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_only_dropped_traffic_logged\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_.*accepted_traffic_logged\n# neutron whitebox multi-thread tests (executed on different workflow step)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n', 'includeList': '^whitebox_neutron_tempest_plugin.*\n^neutron_.*plugin..*scenario.test_.*macvtap\n'}}) 2025-12-01 07:22:52,403 p=37141 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': overriden_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': overriden_workflow}) }}] *** 2025-12-01 07:22:52,403 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.088) 0:00:26.361 ******* 2025-12-01 07:22:52,403 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.088) 0:00:26.361 ******* 2025-12-01 07:22:52,440 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:52,450 p=37141 u=zuul n=ansible | TASK [test_operator : Remove resources until fix for bug 2088074 reaches openstack-tempest-all image no_resources_workflow={{ no_resources_workflow | default([]) + [_no_resources_workflow_step] }}] *** 2025-12-01 07:22:52,451 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.047) 0:00:26.409 ******* 2025-12-01 07:22:52,451 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.047) 0:00:26.409 ******* 2025-12-01 07:22:52,495 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'multi-thread-testing', 'tempestRun': {'concurrency': 6, 'excludeList': 'test_multicast.*ext*\ntest_multicast.*restart\n^neutron_.*plugin..*scenario.test_.*macvtap\n# remove when bug OSPRH-11751 resolved\nvlan_transparent_allowed_address_pairs\nvlan_transparent_port_sec_disabled\nvlan_transparent_packet_length_greater_mtu\n', 'includeList': '# neutron whitebox multi-thread tests\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n'}}) 2025-12-01 07:22:52,511 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'single-thread-testing', 'tempestRun': {'concurrency': 1, 'excludeList': '# remove when this job use openstackclient version bigger than in antelope branch (no more releases)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_ports.PortListLongOptSGsCmd\n# remove when this job use neutron version bigger than antelope (LP#2110018 supported in 2025.1)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_south_north\n# remove when bug OSPRH-9569 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_metadata_rate_limiting\n# remove traffic logging tests when OSPRH-9203 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_only_dropped_traffic_logged\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_.*accepted_traffic_logged\n# neutron whitebox multi-thread tests (executed on different workflow step)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n', 'includeList': '^whitebox_neutron_tempest_plugin.*\n^neutron_.*plugin..*scenario.test_.*macvtap\n'}}) 2025-12-01 07:22:52,522 p=37141 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': no_resources_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': no_resources_workflow}) }}] *** 2025-12-01 07:22:52,522 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.071) 0:00:26.481 ******* 2025-12-01 07:22:52,522 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.071) 0:00:26.480 ******* 2025-12-01 07:22:52,555 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:52,565 p=37141 u=zuul n=ansible | TASK [test_operator : Build tempest timing data URL (no workflow) test_operator_cr={{ test_operator_cr | combine({'spec': {'timingDataUrl': final_timing_data_url}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_timing_data_url': final_timing_data_url}) }}] *** 2025-12-01 07:22:52,566 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.043) 0:00:26.524 ******* 2025-12-01 07:22:52,566 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.043) 0:00:26.524 ******* 2025-12-01 07:22:52,591 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 07:22:52,602 p=37141 u=zuul n=ansible | TASK [test_operator : Add the full timing data url to workflow steps timing_data_url_workflow={{ timing_data_url_workflow | default([]) + [_timing_data_url_workflow_step] }}] *** 2025-12-01 07:22:52,602 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.036) 0:00:26.560 ******* 2025-12-01 07:22:52,602 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.036) 0:00:26.560 ******* 2025-12-01 07:22:52,643 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'multi-thread-testing', 'tempestRun': {'concurrency': 6, 'excludeList': 'test_multicast.*ext*\ntest_multicast.*restart\n^neutron_.*plugin..*scenario.test_.*macvtap\n# remove when bug OSPRH-11751 resolved\nvlan_transparent_allowed_address_pairs\nvlan_transparent_port_sec_disabled\nvlan_transparent_packet_length_greater_mtu\n', 'includeList': '# neutron whitebox multi-thread tests\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n'}, 'resources': {'requests': {}, 'limits': {}}}) 2025-12-01 07:22:52,661 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'stepName': 'single-thread-testing', 'tempestRun': {'concurrency': 1, 'excludeList': '# remove when this job use openstackclient version bigger than in antelope branch (no more releases)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_ports.PortListLongOptSGsCmd\n# remove when this job use neutron version bigger than antelope (LP#2110018 supported in 2025.1)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_south_north\n# remove when bug OSPRH-9569 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_metadata_rate_limiting\n# remove traffic logging tests when OSPRH-9203 resolved\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_only_dropped_traffic_logged\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_.*accepted_traffic_logged\n# neutron whitebox multi-thread tests (executed on different workflow step)\n^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common\n^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency\n^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest\n^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest\n', 'includeList': '^whitebox_neutron_tempest_plugin.*\n^neutron_.*plugin..*scenario.test_.*macvtap\n'}, 'resources': {'requests': {}, 'limits': {}}}) 2025-12-01 07:22:52,672 p=37141 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': timing_data_url_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': timing_data_url_workflow}) }}] *** 2025-12-01 07:22:52,672 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.070) 0:00:26.631 ******* 2025-12-01 07:22:52,672 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.070) 0:00:26.630 ******* 2025-12-01 07:22:52,708 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 07:22:52,720 p=37141 u=zuul n=ansible | TASK [test_operator : Print CR before applying msg={{ test_operator_cr }}] ***** 2025-12-01 07:22:52,720 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.047) 0:00:26.678 ******* 2025-12-01 07:22:52,720 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.047) 0:00:26.678 ******* 2025-12-01 07:22:52,744 p=37141 u=zuul n=ansible | ok: [localhost] => msg: apiVersion: test.openstack.org/v1beta1 kind: Tempest metadata: name: tempest-tests-tempest namespace: openstack spec: SELinuxLevel: s0:c478,c978 SSHKeySecretName: test-operator-controller-priv-key cleanup: false containerImage: quay.rdoproject.org/podified-antelope-centos9/openstack-tempest-all:fa2bb8efef6782c26ea7f1675eeb36dd debug: false networkAttachments: - ctlplane privileged: true rerunFailedTests: false rerunOverrideStatus: false resources: limits: {} requests: {} storageClass: local-storage tempestRun: concurrency: 6 excludeList: | tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_mtu_sized_frames expectedFailuresList: |2+ externalPlugin: [] extraImages: - ID: 11111111-1111-1111-1111-111111111111 URL: https://chandankumar.fedorapeople.org/rocky9_latest_neutron_whitebox.qcow2 diskFormat: qcow2 flavor: ID: 22222222-2222-2222-2222-222222222222 RAM: 1024 disk: 10 name: custom_neutron_guest vcpus: 1 name: custom_neutron_guest extraRPMs: [] includeList: | tempest.scenario.test_network_basic_ops.TestNetworkBasicOps tempestconfRun: deployerInput: | [auth] tempest_roles = [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true [compute-feature-enabled] dhcp_domain = '' [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false [volume] catalog_type = volumev3 overrides: |- compute-feature-enabled.vnc_console true compute-feature-enabled.cold_migration true compute-feature-enabled.block_migration_for_live_migration true network-feature-enabled.port_security true neutron_plugin_options.advanced_image_ssh_user rocky neutron_plugin_options.available_type_drivers geneve neutron_plugin_options.create_shared_resources true neutron_plugin_options.is_igmp_snooping_enabled true neutron_plugin_options.ipv6_metadata false neutron_plugin_options.advanced_image_ref 11111111-1111-1111-1111-111111111111 neutron_plugin_options.advanced_image_flavor_ref 22222222-2222-2222-2222-222222222222 whitebox_neutron_plugin_options.kubeconfig_path '/home/zuul/.crc/machines/crc/kubeconfig' validation.allowed_network_downtime 15 validation.run_validation true identity.v3_endpoint_type public identity.v2_admin_endpoint_type public whitebox_neutron_plugin_options.proxy_host_address 192.168.25.58 workflow: - resources: limits: {} requests: {} stepName: multi-thread-testing tempestRun: concurrency: 6 excludeList: | test_multicast.*ext* test_multicast.*restart ^neutron_.*plugin..*scenario.test_.*macvtap # remove when bug OSPRH-11751 resolved vlan_transparent_allowed_address_pairs vlan_transparent_port_sec_disabled vlan_transparent_packet_length_greater_mtu includeList: | # neutron whitebox multi-thread tests ^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common ^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency ^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency ^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest - resources: limits: {} requests: {} stepName: single-thread-testing tempestRun: concurrency: 1 excludeList: | # remove when this job use openstackclient version bigger than in antelope branch (no more releases) ^whitebox_neutron_tempest_plugin.tests.scenario.test_ports.PortListLongOptSGsCmd # remove when this job use neutron version bigger than antelope (LP#2110018 supported in 2025.1) ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_south_north # remove when bug OSPRH-9569 resolved ^whitebox_neutron_tempest_plugin.tests.scenario.test_metadata_rate_limiting # remove traffic logging tests when OSPRH-9203 resolved ^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_only_dropped_traffic_logged ^whitebox_neutron_tempest_plugin.tests.scenario.test_security_group_logging.*test_.*accepted_traffic_logged # neutron whitebox multi-thread tests (executed on different workflow step) ^whitebox_neutron_tempest_plugin.tests.scenario.test_basic.NetworkBasicTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestIPv4Common ^whitebox_neutron_tempest_plugin.tests.scenario.test_broadcast.BroadcastTestVlanTransparency ^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.ExtraDhcpOptionsTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_extra_dhcp_opts.OvnExtraDhcpOptionsTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_internal_dns.InternalDNSTestOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_flooding_when_special_groups ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Common.test_igmp_snooping_same_network_and_unsubscribe ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestIPv4Ovn ^whitebox_neutron_tempest_plugin.tests.scenario.test_multicast.MulticastTestVlanTransparency ^whitebox_neutron_tempest_plugin.tests.scenario.test_portsecurity.PortSecurityTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_east_west ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_bw_limit_tenant_network ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_default_qos_policy ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_east_west ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_dscp_marking_tenant_network ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_cold_migration ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestCommon.test_qos_after_live_migration ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestDscpInheritanceOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestOvn ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovBwLimitTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_qos.QosTestSriovMinBwPlacementEnforcementTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_security_groups.NetworkDefaultSecGroupTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MtuVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiPortVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vlan_transparency.MultiVlanTransparencyTest ^whitebox_neutron_tempest_plugin.tests.scenario.test_vrrp.VrrpTest includeList: | ^whitebox_neutron_tempest_plugin.* ^neutron_.*plugin..*scenario.test_.*macvtap 2025-12-01 07:22:52,754 p=37141 u=zuul n=ansible | TASK [test_operator : Make sure test-operator CR directory exists path={{ cifmw_test_operator_crs_path }}, state=directory, mode=0755] *** 2025-12-01 07:22:52,754 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.034) 0:00:26.712 ******* 2025-12-01 07:22:52,754 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.034) 0:00:26.712 ******* 2025-12-01 07:22:52,973 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:52,983 p=37141 u=zuul n=ansible | TASK [test_operator : Write test-operator CR to file content={{ test_operator_cr }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml, mode=0644] *** 2025-12-01 07:22:52,983 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.228) 0:00:26.941 ******* 2025-12-01 07:22:52,983 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:52 +0000 (0:00:00.228) 0:00:26.941 ******* 2025-12-01 07:22:53,348 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:53,360 p=37141 u=zuul n=ansible | TASK [test_operator : Start tests - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml] *** 2025-12-01 07:22:53,360 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:53 +0000 (0:00:00.377) 0:00:27.319 ******* 2025-12-01 07:22:53,360 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:53 +0000 (0:00:00.377) 0:00:27.318 ******* 2025-12-01 07:22:54,087 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 07:22:54,098 p=37141 u=zuul n=ansible | TASK [test_operator : Wait for the last Pod to be Completed - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['workflowStep={{ [(test_operator_workflow | length) - 1, 0] | max }}', 'instanceName={{ test_operator_instance_name }}']] *** 2025-12-01 07:22:54,098 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:54 +0000 (0:00:00.737) 0:00:28.056 ******* 2025-12-01 07:22:54,098 p=37141 u=zuul n=ansible | Monday 01 December 2025 07:22:54 +0000 (0:00:00.737) 0:00:28.056 ******* 2025-12-01 09:00:35,530 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:35,541 p=37141 u=zuul n=ansible | TASK [test_operator : Check whether timed out - tempest testpod_timed_out={{ testpod.attempts == (cifmw_test_operator_timeout / 10) | round | int }}] *** 2025-12-01 09:00:35,541 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (1:37:41.443) 1:38:09.500 ******* 2025-12-01 09:00:35,541 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (1:37:41.443) 1:38:09.499 ******* 2025-12-01 09:00:35,565 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:35,574 p=37141 u=zuul n=ansible | TASK [test_operator : Collect logs _raw_params=collect-logs.yaml] ************** 2025-12-01 09:00:35,575 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.033) 1:38:09.533 ******* 2025-12-01 09:00:35,575 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.033) 1:38:09.533 ******* 2025-12-01 09:00:35,605 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/collect-logs.yaml for localhost 2025-12-01 09:00:35,622 p=37141 u=zuul n=ansible | TASK [test_operator : Reset volumes and volume_mounts to an empty list _test_operator_volumes=[], _test_operator_volume_mounts=[]] *** 2025-12-01 09:00:35,622 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.047) 1:38:09.581 ******* 2025-12-01 09:00:35,622 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.047) 1:38:09.580 ******* 2025-12-01 09:00:35,641 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:35,649 p=37141 u=zuul n=ansible | TASK [test_operator : Get information about PVCs that store the logs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=PersistentVolumeClaim, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2025-12-01 09:00:35,649 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.027) 1:38:09.608 ******* 2025-12-01 09:00:35,649 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:35 +0000 (0:00:00.027) 1:38:09.607 ******* 2025-12-01 09:00:36,250 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:36,259 p=37141 u=zuul n=ansible | TASK [test_operator : Set up volume mounts and volumes for all PVCs _test_operator_volume_mounts={{ (_test_operator_volume_mounts | default([])) + [{ 'name': "logs-volume-" ~ index, 'mountPath': "/mnt/logs-{{ test_operator_instance_name }}-step-" ~ index }] }} , _test_operator_volumes={{ (_test_operator_volumes | default([])) + [{ 'name': "logs-volume-" ~ index, 'persistentVolumeClaim': { 'claimName': pvc.metadata.name } }] }} ] *** 2025-12-01 09:00:36,260 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.610) 1:38:10.218 ******* 2025-12-01 09:00:36,260 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.610) 1:38:10.218 ******* 2025-12-01 09:00:36,288 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-d9cb2', 'namespace': 'openstack', 'uid': '0ffe833e-5b68-49be-9f2a-eb9440046a84', 'resourceVersion': '58361', 'creationTimestamp': '2025-12-01T07:22:54Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': 'ab31b31e-4e1c-4f13-9fa0-9d7ee2df3888', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"ab31b31e-4e1c-4f13-9fa0-9d7ee2df3888"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage01-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2025-12-01 09:00:36,298 p=37141 u=zuul n=ansible | TASK [test_operator : Write log pod definition to file content={{ cifmw_test_operator_log_pod_definition }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml, mode=0644] *** 2025-12-01 09:00:36,298 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.038) 1:38:10.257 ******* 2025-12-01 09:00:36,298 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.038) 1:38:10.256 ******* 2025-12-01 09:00:36,625 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:36,634 p=37141 u=zuul n=ansible | TASK [test_operator : Start test-operator-logs-pod kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml] *** 2025-12-01 09:00:36,634 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.335) 1:38:10.592 ******* 2025-12-01 09:00:36,634 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:36 +0000 (0:00:00.335) 1:38:10.592 ******* 2025-12-01 09:00:42,257 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:42,266 p=37141 u=zuul n=ansible | TASK [test_operator : Ensure that the test-operator-logs-pod is Running kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, name=test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}, wait=True] *** 2025-12-01 09:00:42,266 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:42 +0000 (0:00:05.632) 1:38:16.225 ******* 2025-12-01 09:00:42,266 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:42 +0000 (0:00:05.632) 1:38:16.224 ******* 2025-12-01 09:00:42,861 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:42,871 p=37141 u=zuul n=ansible | TASK [test_operator : Get logs from test-operator-logs-pod _raw_params=oc cp -n {{ stage_vars_dict.cifmw_test_operator_namespace }} test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}:{{ pod_path }} {{ cifmw_test_operator_artifacts_basedir }} ] *** 2025-12-01 09:00:42,871 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:42 +0000 (0:00:00.604) 1:38:16.830 ******* 2025-12-01 09:00:42,871 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:42 +0000 (0:00:00.604) 1:38:16.829 ******* 2025-12-01 09:00:43,378 p=37141 u=zuul n=ansible | changed: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-d9cb2', 'namespace': 'openstack', 'uid': '0ffe833e-5b68-49be-9f2a-eb9440046a84', 'resourceVersion': '58361', 'creationTimestamp': '2025-12-01T07:22:54Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': 'ab31b31e-4e1c-4f13-9fa0-9d7ee2df3888', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-12-01T07:22:54Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"ab31b31e-4e1c-4f13-9fa0-9d7ee2df3888"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage01-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2025-12-01 09:00:43,390 p=37141 u=zuul n=ansible | TASK [test_operator : Get list of all pods kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod] *** 2025-12-01 09:00:43,390 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:43 +0000 (0:00:00.518) 1:38:17.349 ******* 2025-12-01 09:00:43,390 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:43 +0000 (0:00:00.518) 1:38:17.348 ******* 2025-12-01 09:00:44,590 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:44,793 p=37141 u=zuul n=ansible | TASK [test_operator : Get test results from all test pods (Success / Fail) kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2025-12-01 09:00:44,793 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:44 +0000 (0:00:01.403) 1:38:18.752 ******* 2025-12-01 09:00:44,793 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:44 +0000 (0:00:01.403) 1:38:18.751 ******* 2025-12-01 09:00:45,384 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:45,401 p=37141 u=zuul n=ansible | TASK [test_operator : Get status from test pods pod_status={{ test_pod_results.resources | map(attribute='status.phase') | list | unique }}] *** 2025-12-01 09:00:45,401 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.607) 1:38:19.360 ******* 2025-12-01 09:00:45,401 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.607) 1:38:19.359 ******* 2025-12-01 09:00:45,425 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:45,434 p=37141 u=zuul n=ansible | TASK [test_operator : Check whether test pods finished successfully successful_execution={{ pod_status | length == 1 and pod_status | first == 'Succeeded' }}] *** 2025-12-01 09:00:45,434 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.032) 1:38:19.392 ******* 2025-12-01 09:00:45,434 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.032) 1:38:19.392 ******* 2025-12-01 09:00:45,456 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:45,465 p=37141 u=zuul n=ansible | TASK [test_operator : Fail fast if a pod did not succeed - tempest that=successful_execution] *** 2025-12-01 09:00:45,465 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.031) 1:38:19.424 ******* 2025-12-01 09:00:45,465 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.031) 1:38:19.423 ******* 2025-12-01 09:00:45,482 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:45,492 p=37141 u=zuul n=ansible | TASK [test_operator : Save result - tempest test_operator_results={{ test_operator_results | default({}) | combine({run_test_fw: successful_execution}) }}] *** 2025-12-01 09:00:45,492 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.027) 1:38:19.451 ******* 2025-12-01 09:00:45,493 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.027) 1:38:19.450 ******* 2025-12-01 09:00:45,513 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:45,521 p=37141 u=zuul n=ansible | TASK [test_operator : Delete test resources _raw_params=cleanup-run.yaml] ****** 2025-12-01 09:00:45,522 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.029) 1:38:19.480 ******* 2025-12-01 09:00:45,522 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.029) 1:38:19.480 ******* 2025-12-01 09:00:45,539 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:45,547 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 09:00:45,547 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.025) 1:38:19.506 ******* 2025-12-01 09:00:45,547 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.025) 1:38:19.505 ******* 2025-12-01 09:00:45,571 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:45,581 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 09:00:45,581 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.033) 1:38:19.539 ******* 2025-12-01 09:00:45,581 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.033) 1:38:19.539 ******* 2025-12-01 09:00:45,602 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:45,611 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_test_hooks _raw_params={{ hook.type }}.yml] *** 2025-12-01 09:00:45,611 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.030) 1:38:19.570 ******* 2025-12-01 09:00:45,612 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.030) 1:38:19.569 ******* 2025-12-01 09:00:45,729 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:45,746 p=37141 u=zuul n=ansible | TASK [test_operator : Fail when any tests failed that=['item.value'], success_msg={{ item.key }} tests passed, fail_msg={{ item.key }} tests failed] *** 2025-12-01 09:00:45,746 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.134) 1:38:19.704 ******* 2025-12-01 09:00:45,746 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.134) 1:38:19.704 ******* 2025-12-01 09:00:45,772 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'key': 'tempest', 'value': True}) => ansible_loop_var: item changed: false item: key: tempest value: true msg: tempest tests passed 2025-12-01 09:00:45,788 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 09:00:45,788 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.042) 1:38:19.747 ******* 2025-12-01 09:00:45,789 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.042) 1:38:19.746 ******* 2025-12-01 09:00:45,841 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:45,850 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 09:00:45,850 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.061) 1:38:19.809 ******* 2025-12-01 09:00:45,850 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:45 +0000 (0:00:00.061) 1:38:19.808 ******* 2025-12-01 09:00:46,002 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:46,011 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_tests _raw_params={{ hook.type }}.yml] *** 2025-12-01 09:00:46,011 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.161) 1:38:19.970 ******* 2025-12-01 09:00:46,011 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.161) 1:38:19.969 ******* 2025-12-01 09:00:46,164 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,186 p=37141 u=zuul n=ansible | TASK [compliance : Ensure compliance folder exists path={{ cifmw_compliance_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2025-12-01 09:00:46,186 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.174) 1:38:20.144 ******* 2025-12-01 09:00:46,186 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.174) 1:38:20.144 ******* 2025-12-01 09:00:46,201 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,210 p=37141 u=zuul n=ansible | TASK [compliance : Install the compliance operator and plugin _raw_params=install.yml] *** 2025-12-01 09:00:46,211 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.024) 1:38:20.169 ******* 2025-12-01 09:00:46,211 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.024) 1:38:20.169 ******* 2025-12-01 09:00:46,225 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,233 p=37141 u=zuul n=ansible | TASK [compliance : Run compliance scans and extract results _raw_params=run_suite_scan.yml] *** 2025-12-01 09:00:46,233 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.192 ******* 2025-12-01 09:00:46,233 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.191 ******* 2025-12-01 09:00:46,251 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=cis) 2025-12-01 09:00:46,253 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=e8) 2025-12-01 09:00:46,257 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=high) 2025-12-01 09:00:46,260 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=moderate) 2025-12-01 09:00:46,264 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=nerc-cip) 2025-12-01 09:00:46,268 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=pci-dss) 2025-12-01 09:00:46,270 p=37141 u=zuul n=ansible | skipping: [localhost] => (item=stig) 2025-12-01 09:00:46,271 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,279 p=37141 u=zuul n=ansible | TASK [compliance : Delete all resources created by the role _raw_params=cleanup.yml] *** 2025-12-01 09:00:46,279 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.045) 1:38:20.238 ******* 2025-12-01 09:00:46,279 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.045) 1:38:20.237 ******* 2025-12-01 09:00:46,294 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,346 p=37141 u=zuul n=ansible | TASK [Validate required variables are set that=['cifmw_fdp_update_target_package is defined', 'cifmw_fdp_update_target_package | length > 0', 'cifmw_fdp_update_repo_baseurl is defined', 'cifmw_fdp_update_repo_baseurl | length > 0'], fail_msg=Required variables are missing! You must set: - cifmw_fdp_update_target_package: Name of the RPM package to update - cifmw_fdp_update_repo_baseurl: Repository base URL containing the updated package , success_msg=Required variables validated successfully] *** 2025-12-01 09:00:46,346 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.066) 1:38:20.304 ******* 2025-12-01 09:00:46,346 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.066) 1:38:20.304 ******* 2025-12-01 09:00:46,361 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,370 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Validate parameters and initialize _raw_params=validate.yml] *** 2025-12-01 09:00:46,370 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.024) 1:38:20.328 ******* 2025-12-01 09:00:46,370 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.024) 1:38:20.328 ******* 2025-12-01 09:00:46,384 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,393 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Detect OpenShift registry URL _raw_params=detect_registry.yml] *** 2025-12-01 09:00:46,393 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.351 ******* 2025-12-01 09:00:46,393 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.351 ******* 2025-12-01 09:00:46,413 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,421 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Configure registry CA certificate _raw_params=configure_ca_cert.yml] *** 2025-12-01 09:00:46,422 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.028) 1:38:20.380 ******* 2025-12-01 09:00:46,422 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.028) 1:38:20.380 ******* 2025-12-01 09:00:46,436 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,445 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Authenticate with registry _raw_params=authenticate_registry.yml] *** 2025-12-01 09:00:46,445 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.404 ******* 2025-12-01 09:00:46,445 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.403 ******* 2025-12-01 09:00:46,459 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,468 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Fetch images to process _raw_params=fetch_images.yml] *** 2025-12-01 09:00:46,468 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.426 ******* 2025-12-01 09:00:46,468 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.022) 1:38:20.426 ******* 2025-12-01 09:00:46,485 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,495 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Build and push updated images _raw_params=process_image.yml] *** 2025-12-01 09:00:46,495 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.027) 1:38:20.454 ******* 2025-12-01 09:00:46,495 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.027) 1:38:20.453 ******* 2025-12-01 09:00:46,510 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,518 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Display summary msg=['==========================================', 'Container image update complete', 'Target package: {{ cifmw_fdp_update_container_images_target_package }}', 'Images processed: {{ _cifmw_fdp_update_container_images_processed_images }}', "Updated: {{ _cifmw_fdp_update_container_images_updated_cr_keys | join(', ') if _cifmw_fdp_update_container_images_updated_cr_keys | length > 0 else 'None' }}", '==========================================']] *** 2025-12-01 09:00:46,519 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.477 ******* 2025-12-01 09:00:46,519 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.477 ******* 2025-12-01 09:00:46,533 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,542 p=37141 u=zuul n=ansible | TASK [fdp_update_container_images : Cleanup temporary directory path={{ _cifmw_fdp_update_container_images_temp_dir }}, state=absent] *** 2025-12-01 09:00:46,542 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.500 ******* 2025-12-01 09:00:46,542 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.023) 1:38:20.500 ******* 2025-12-01 09:00:46,560 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:46,601 p=37141 u=zuul n=ansible | PLAY [Run compliance scan for computes] **************************************** 2025-12-01 09:00:46,627 p=37141 u=zuul n=ansible | TASK [compliance : Install openscap-scanner and security guide name=['openscap-scanner', 'scap-security-guide'], state=present] *** 2025-12-01 09:00:46,627 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.085) 1:38:20.585 ******* 2025-12-01 09:00:46,627 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.085) 1:38:20.585 ******* 2025-12-01 09:00:46,641 p=37141 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 09:00:46,648 p=37141 u=zuul n=ansible | TASK [compliance : Create folder to hold scan results path={{ cifmw_compliance_compute_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2025-12-01 09:00:46,648 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.021) 1:38:20.607 ******* 2025-12-01 09:00:46,648 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.021) 1:38:20.606 ******* 2025-12-01 09:00:46,662 p=37141 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 09:00:46,669 p=37141 u=zuul n=ansible | TASK [compliance : Do compliance scans _raw_params=oscap xccdf eval --report {{ cifmw_compliance_compute_artifacts_basedir }}/{{ profile }}.html --profile {{ profile}} /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml] *** 2025-12-01 09:00:46,669 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.020) 1:38:20.627 ******* 2025-12-01 09:00:46,669 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.020) 1:38:20.627 ******* 2025-12-01 09:00:46,685 p=37141 u=zuul n=ansible | skipping: [compute-0] => (item=pci-dss) 2025-12-01 09:00:46,688 p=37141 u=zuul n=ansible | skipping: [compute-0] => (item=e8) 2025-12-01 09:00:46,691 p=37141 u=zuul n=ansible | skipping: [compute-0] => (item=stig) 2025-12-01 09:00:46,692 p=37141 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 09:00:46,698 p=37141 u=zuul n=ansible | TASK [compliance : Set ownership on report files path={{ cifmw_compliance_compute_artifacts_basedir }}, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, recurse=True] *** 2025-12-01 09:00:46,698 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.029) 1:38:20.657 ******* 2025-12-01 09:00:46,698 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.029) 1:38:20.656 ******* 2025-12-01 09:00:46,715 p=37141 u=zuul n=ansible | skipping: [compute-0] 2025-12-01 09:00:46,766 p=37141 u=zuul n=ansible | PLAY [Run hooks and inject status flag] **************************************** 2025-12-01 09:00:46,787 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 09:00:46,787 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.088) 1:38:20.745 ******* 2025-12-01 09:00:46,787 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.088) 1:38:20.745 ******* 2025-12-01 09:00:46,838 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:46,846 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 09:00:46,846 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.059) 1:38:20.805 ******* 2025-12-01 09:00:46,846 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:46 +0000 (0:00:00.059) 1:38:20.804 ******* 2025-12-01 09:00:46,996 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:47,005 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_end _raw_params={{ hook.type }}.yml] **** 2025-12-01 09:00:47,005 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.158) 1:38:20.963 ******* 2025-12-01 09:00:47,005 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.158) 1:38:20.963 ******* 2025-12-01 09:00:47,156 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:47,170 p=37141 u=zuul n=ansible | TASK [Inject success flag path={{ ansible_user_dir }}/cifmw-success, state=touch, mode=0644] *** 2025-12-01 09:00:47,170 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.165) 1:38:21.129 ******* 2025-12-01 09:00:47,171 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.165) 1:38:21.128 ******* 2025-12-01 09:00:47,323 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:47,387 p=37141 u=zuul n=ansible | PLAY [Run log related tasks] *************************************************** 2025-12-01 09:00:47,416 p=37141 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-01 09:00:47,416 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.245) 1:38:21.375 ******* 2025-12-01 09:00:47,416 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.245) 1:38:21.374 ******* 2025-12-01 09:00:47,466 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:47,474 p=37141 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-01 09:00:47,474 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.058) 1:38:21.433 ******* 2025-12-01 09:00:47,474 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.058) 1:38:21.432 ******* 2025-12-01 09:00:47,590 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:47,599 p=37141 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_logs _raw_params={{ hook.type }}.yml] *** 2025-12-01 09:00:47,599 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.124) 1:38:21.557 ******* 2025-12-01 09:00:47,599 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.124) 1:38:21.557 ******* 2025-12-01 09:00:47,717 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:47,732 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Ensure cifmw_basedir param is set cifmw_basedir={{ ansible_user_dir }}/ci-framework-data] *** 2025-12-01 09:00:47,732 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.133) 1:38:21.691 ******* 2025-12-01 09:00:47,732 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.133) 1:38:21.690 ******* 2025-12-01 09:00:47,752 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:47,760 p=37141 u=zuul n=ansible | TASK [Read artifacts parameters dir and set as facts name=cifmw_helpers, tasks_from=include_dir.yml] *** 2025-12-01 09:00:47,760 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.027) 1:38:21.719 ******* 2025-12-01 09:00:47,760 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.027) 1:38:21.718 ******* 2025-12-01 09:00:47,794 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Check directory is available path={{ included_dir | trim }}] *** 2025-12-01 09:00:47,794 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.034) 1:38:21.753 ******* 2025-12-01 09:00:47,794 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.034) 1:38:21.752 ******* 2025-12-01 09:00:47,947 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:47,955 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Find yaml files paths={{ included_dir | trim }}, patterns=*.yml,*.yaml, file_type=file, recurse=False] *** 2025-12-01 09:00:47,955 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.161) 1:38:21.914 ******* 2025-12-01 09:00:47,956 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:47 +0000 (0:00:00.161) 1:38:21.913 ******* 2025-12-01 09:00:48,229 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:48,238 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Print available yaml files msg=Found yaml files to parse: {{ _yaml_files.files | map(attribute='path') | list }} ] *** 2025-12-01 09:00:48,239 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.283) 1:38:22.197 ******* 2025-12-01 09:00:48,239 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.283) 1:38:22.197 ******* 2025-12-01 09:00:48,260 p=37141 u=zuul n=ansible | ok: [localhost] => msg: | Found yaml files to parse: ['/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml'] 2025-12-01 09:00:48,268 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create files on localhost and use include_vars] ********** 2025-12-01 09:00:48,268 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.029) 1:38:22.226 ******* 2025-12-01 09:00:48,268 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.029) 1:38:22.226 ******* 2025-12-01 09:00:48,306 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2025-12-01 09:00:48,311 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2025-12-01 09:00:48,316 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2025-12-01 09:00:48,321 p=37141 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2025-12-01 09:00:48,330 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2025-12-01 09:00:48,330 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.062) 1:38:22.289 ******* 2025-12-01 09:00:48,330 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.062) 1:38:22.288 ******* 2025-12-01 09:00:48,348 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:48,356 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2025-12-01 09:00:48,356 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.026) 1:38:22.315 ******* 2025-12-01 09:00:48,356 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.026) 1:38:22.314 ******* 2025-12-01 09:00:48,515 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:48,524 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2025-12-01 09:00:48,524 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.167) 1:38:22.483 ******* 2025-12-01 09:00:48,524 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.167) 1:38:22.482 ******* 2025-12-01 09:00:48,790 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:48,798 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2025-12-01 09:00:48,798 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.274) 1:38:22.757 ******* 2025-12-01 09:00:48,799 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.274) 1:38:22.756 ******* 2025-12-01 09:00:48,942 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:48,950 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2025-12-01 09:00:48,950 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.151) 1:38:22.909 ******* 2025-12-01 09:00:48,951 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:48 +0000 (0:00:00.151) 1:38:22.908 ******* 2025-12-01 09:00:49,316 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:49,324 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2025-12-01 09:00:49,324 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.373) 1:38:23.283 ******* 2025-12-01 09:00:49,324 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.373) 1:38:23.282 ******* 2025-12-01 09:00:49,400 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:49,446 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2025-12-01 09:00:49,446 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.121) 1:38:23.405 ******* 2025-12-01 09:00:49,446 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.121) 1:38:23.404 ******* 2025-12-01 09:00:49,596 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:49,605 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2025-12-01 09:00:49,605 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.159) 1:38:23.564 ******* 2025-12-01 09:00:49,605 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.159) 1:38:23.563 ******* 2025-12-01 09:00:49,623 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:49,632 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2025-12-01 09:00:49,633 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.027) 1:38:23.591 ******* 2025-12-01 09:00:49,633 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.027) 1:38:23.591 ******* 2025-12-01 09:00:49,794 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:49,802 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2025-12-01 09:00:49,803 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.170) 1:38:23.761 ******* 2025-12-01 09:00:49,803 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.170) 1:38:23.761 ******* 2025-12-01 09:00:49,954 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:49,962 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2025-12-01 09:00:49,962 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.159) 1:38:23.921 ******* 2025-12-01 09:00:49,962 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:49 +0000 (0:00:00.159) 1:38:23.920 ******* 2025-12-01 09:00:50,105 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:50,114 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2025-12-01 09:00:50,114 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.151) 1:38:24.073 ******* 2025-12-01 09:00:50,114 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.151) 1:38:24.072 ******* 2025-12-01 09:00:50,439 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:50,448 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2025-12-01 09:00:50,448 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.333) 1:38:24.406 ******* 2025-12-01 09:00:50,448 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.333) 1:38:24.406 ******* 2025-12-01 09:00:50,486 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:50,494 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2025-12-01 09:00:50,494 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.046) 1:38:24.453 ******* 2025-12-01 09:00:50,494 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.046) 1:38:24.452 ******* 2025-12-01 09:00:50,644 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:50,653 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2025-12-01 09:00:50,653 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.158) 1:38:24.611 ******* 2025-12-01 09:00:50,653 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.158) 1:38:24.611 ******* 2025-12-01 09:00:50,670 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:50,678 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2025-12-01 09:00:50,678 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.025) 1:38:24.637 ******* 2025-12-01 09:00:50,678 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.025) 1:38:24.636 ******* 2025-12-01 09:00:50,839 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:50,847 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2025-12-01 09:00:50,847 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.169) 1:38:24.806 ******* 2025-12-01 09:00:50,847 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:50 +0000 (0:00:00.169) 1:38:24.805 ******* 2025-12-01 09:00:50,999 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:51,008 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2025-12-01 09:00:51,008 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.160) 1:38:24.967 ******* 2025-12-01 09:00:51,008 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.160) 1:38:24.966 ******* 2025-12-01 09:00:51,150 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:51,158 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2025-12-01 09:00:51,158 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.149) 1:38:25.117 ******* 2025-12-01 09:00:51,158 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.149) 1:38:25.116 ******* 2025-12-01 09:00:51,483 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:51,492 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2025-12-01 09:00:51,492 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.333) 1:38:25.451 ******* 2025-12-01 09:00:51,492 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.333) 1:38:25.450 ******* 2025-12-01 09:00:51,522 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:51,530 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2025-12-01 09:00:51,530 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.038) 1:38:25.489 ******* 2025-12-01 09:00:51,530 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.038) 1:38:25.488 ******* 2025-12-01 09:00:51,682 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:51,702 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2025-12-01 09:00:51,702 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.171) 1:38:25.661 ******* 2025-12-01 09:00:51,703 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.172) 1:38:25.660 ******* 2025-12-01 09:00:51,721 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:51,730 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2025-12-01 09:00:51,730 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.027) 1:38:25.689 ******* 2025-12-01 09:00:51,730 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.027) 1:38:25.688 ******* 2025-12-01 09:00:51,890 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:51,899 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2025-12-01 09:00:51,899 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.168) 1:38:25.857 ******* 2025-12-01 09:00:51,899 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:51 +0000 (0:00:00.168) 1:38:25.857 ******* 2025-12-01 09:00:52,049 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:52,100 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2025-12-01 09:00:52,100 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.201) 1:38:26.058 ******* 2025-12-01 09:00:52,100 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.201) 1:38:26.058 ******* 2025-12-01 09:00:52,244 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:52,253 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2025-12-01 09:00:52,253 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.153) 1:38:26.212 ******* 2025-12-01 09:00:52,253 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.153) 1:38:26.211 ******* 2025-12-01 09:00:52,591 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:52,599 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2025-12-01 09:00:52,600 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.346) 1:38:26.558 ******* 2025-12-01 09:00:52,600 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.346) 1:38:26.558 ******* 2025-12-01 09:00:52,628 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:52,636 p=37141 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2025-12-01 09:00:52,636 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.036) 1:38:26.595 ******* 2025-12-01 09:00:52,636 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.036) 1:38:26.594 ******* 2025-12-01 09:00:52,785 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:52,800 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-01 09:00:52,800 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.163) 1:38:26.758 ******* 2025-12-01 09:00:52,800 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.163) 1:38:26.758 ******* 2025-12-01 09:00:52,817 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:52,826 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Set destination folder for the logs logfiles_dest_dir={{ ( cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data'), 'logs/', now(fmt='%Y-%m-%d_%H-%M') ) | path_join }}] *** 2025-12-01 09:00:52,826 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.026) 1:38:26.785 ******* 2025-12-01 09:00:52,826 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.026) 1:38:26.784 ******* 2025-12-01 09:00:52,846 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:52,855 p=37141 u=zuul n=ansible | TASK [artifacts : Verify if "success" flag exists after successful tests execution path={{ ansible_user_dir }}/cifmw-success] *** 2025-12-01 09:00:52,855 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.028) 1:38:26.814 ******* 2025-12-01 09:00:52,855 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:52 +0000 (0:00:00.028) 1:38:26.813 ******* 2025-12-01 09:00:53,006 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:53,015 p=37141 u=zuul n=ansible | TASK [artifacts : Ensure we have at least minimal ansible facts gather_subset=min] *** 2025-12-01 09:00:53,015 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.160) 1:38:26.974 ******* 2025-12-01 09:00:53,015 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.160) 1:38:26.973 ******* 2025-12-01 09:00:53,498 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:53,506 p=37141 u=zuul n=ansible | TASK [artifacts : Ensure base directory exists path={{ cifmw_artifacts_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-01 09:00:53,506 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.491) 1:38:27.465 ******* 2025-12-01 09:00:53,507 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.491) 1:38:27.464 ******* 2025-12-01 09:00:53,666 p=37141 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2025-12-01 09:00:53,806 p=37141 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-12-01 09:00:53,816 p=37141 u=zuul n=ansible | TASK [artifacts : Load generated hook environment for further usage dir={{ cifmw_artifacts_basedir }}/artifacts, depth=1, files_matching=^(pre|post).*\.yml$] *** 2025-12-01 09:00:53,816 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.309) 1:38:27.774 ******* 2025-12-01 09:00:53,816 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.309) 1:38:27.774 ******* 2025-12-01 09:00:53,842 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:53,850 p=37141 u=zuul n=ansible | TASK [artifacts : Gather parameter passed to the playbook mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-vars.yml, content={{ vars | to_nice_yaml }}] *** 2025-12-01 09:00:53,851 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.034) 1:38:27.809 ******* 2025-12-01 09:00:53,851 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:53 +0000 (0:00:00.034) 1:38:27.809 ******* 2025-12-01 09:00:55,360 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:55,368 p=37141 u=zuul n=ansible | TASK [artifacts : Gather facts mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-facts.yml, content={{ ansible_facts | to_nice_yaml }}] *** 2025-12-01 09:00:55,368 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:01.517) 1:38:29.327 ******* 2025-12-01 09:00:55,368 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:01.517) 1:38:29.326 ******* 2025-12-01 09:00:55,705 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:55,714 p=37141 u=zuul n=ansible | TASK [artifacts : Copy some network configuration files _raw_params=cp /etc/resolv.conf /etc/hosts {{ cifmw_artifacts_basedir }}/artifacts/ cp -r /etc/NetworkManager/system-connections {{ cifmw_artifacts_basedir }}/artifacts/NetworkManager cp -r /etc/yum.repos.d {{ cifmw_artifacts_basedir }}/artifacts/yum_repos test -d /etc/ci/env && cp -r /etc/ci/env {{ cifmw_artifacts_basedir }}/artifacts/ci-env test -d /var/log/bmaas_console_logs && cp -r /var/log/bmaas_console_logs {{ cifmw_artifacts_basedir }}/logs ip ro ls > {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip rule ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip -j -p link ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt] *** 2025-12-01 09:00:55,714 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:00.346) 1:38:29.673 ******* 2025-12-01 09:00:55,714 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:00.346) 1:38:29.672 ******* 2025-12-01 09:00:55,901 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:55,909 p=37141 u=zuul n=ansible | TASK [artifacts : Get installed packages list ] ******************************** 2025-12-01 09:00:55,910 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:00.195) 1:38:29.868 ******* 2025-12-01 09:00:55,910 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:55 +0000 (0:00:00.195) 1:38:29.868 ******* 2025-12-01 09:00:56,649 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:56,678 p=37141 u=zuul n=ansible | TASK [artifacts : Output package list mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/installed-packages.yml, content={{ ansible_facts.packages | to_nice_yaml }}] *** 2025-12-01 09:00:56,678 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:56 +0000 (0:00:00.768) 1:38:30.637 ******* 2025-12-01 09:00:56,678 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:56 +0000 (0:00:00.768) 1:38:30.636 ******* 2025-12-01 09:00:57,047 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:57,070 p=37141 u=zuul n=ansible | TASK [artifacts : Cleanup unnecesary directories path={{ item }}, state=absent] *** 2025-12-01 09:00:57,070 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.392) 1:38:31.029 ******* 2025-12-01 09:00:57,070 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.392) 1:38:31.028 ******* 2025-12-01 09:00:57,290 p=37141 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/operator) 2025-12-01 09:00:57,317 p=37141 u=zuul n=ansible | TASK [os_must_gather : Ensure directories are present path={{ cifmw_os_must_gather_output_log_dir }}, state=directory, mode=0755] *** 2025-12-01 09:00:57,317 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.247) 1:38:31.276 ******* 2025-12-01 09:00:57,317 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.247) 1:38:31.275 ******* 2025-12-01 09:00:57,474 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:57,496 p=37141 u=zuul n=ansible | TASK [os_must_gather : Construct project change list zuul_change_list={{ zuul_change_list | default([]) + [item.project.short_name] }}, cacheable=True] *** 2025-12-01 09:00:57,497 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.179) 1:38:31.455 ******* 2025-12-01 09:00:57,497 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.179) 1:38:31.455 ******* 2025-12-01 09:00:57,525 p=37141 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-12-01 09:00:57,556 p=37141 u=zuul n=ansible | TASK [os_must_gather : Get git tag for image tagging chdir={{ cifmw_os_must_gather_repo_path }}, _raw_params=git show-ref --head --hash head] *** 2025-12-01 09:00:57,556 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.059) 1:38:31.514 ******* 2025-12-01 09:00:57,556 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.059) 1:38:31.514 ******* 2025-12-01 09:00:57,575 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:57,597 p=37141 u=zuul n=ansible | TASK [os_must_gather : Debug git show-ref msg={{ openstack_must_gather_tag }}] *** 2025-12-01 09:00:57,597 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.041) 1:38:31.555 ******* 2025-12-01 09:00:57,597 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.041) 1:38:31.555 ******* 2025-12-01 09:00:57,616 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:57,639 p=37141 u=zuul n=ansible | TASK [os_must_gather : Build openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-build, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-12-01 09:00:57,639 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.042) 1:38:31.598 ******* 2025-12-01 09:00:57,639 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.042) 1:38:31.597 ******* 2025-12-01 09:00:57,659 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:57,681 p=37141 u=zuul n=ansible | TASK [os_must_gather : Push openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-push, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-12-01 09:00:57,681 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.041) 1:38:31.639 ******* 2025-12-01 09:00:57,681 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.041) 1:38:31.639 ******* 2025-12-01 09:00:57,701 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:57,723 p=37141 u=zuul n=ansible | TASK [os_must_gather : Set cifmw_os_must_gather_image to new image tag cifmw_os_must_gather_image={{ cifmw_os_must_gather_image_registry }}/openstack-must-gather:{{ openstack_must_gather_tag.stdout }}] *** 2025-12-01 09:00:57,723 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.042) 1:38:31.682 ******* 2025-12-01 09:00:57,723 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.042) 1:38:31.681 ******* 2025-12-01 09:00:57,795 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:57,814 p=37141 u=zuul n=ansible | TASK [os_must_gather : Check for oc command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=command -v oc] *** 2025-12-01 09:00:57,814 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.091) 1:38:31.773 ******* 2025-12-01 09:00:57,814 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.091) 1:38:31.772 ******* 2025-12-01 09:00:57,852 p=37141 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_check_for_oc.log 2025-12-01 09:00:57,906 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:00:57,928 p=37141 u=zuul n=ansible | TASK [os_must_gather : Check if kubeconfig exists path={{ cifmw_openshift_kubeconfig | default(cifmw_os_must_gather_kubeconfig) }}] *** 2025-12-01 09:00:57,928 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.114) 1:38:31.887 ******* 2025-12-01 09:00:57,928 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:57 +0000 (0:00:00.114) 1:38:31.886 ******* 2025-12-01 09:00:58,089 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:58,112 p=37141 u=zuul n=ansible | TASK [os_must_gather : Run openstack-must-gather command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=timeout {{ shell_cmd_timeout }} oc adm must-gather --image {{ cifmw_os_must_gather_image }} --timeout {{ cifmw_os_must_gather_timeout }} --host-network={{ cifmw_os_must_gather_host_network }} --dest-dir {{ cifmw_os_must_gather_output_log_dir }} -- ADDITIONAL_NAMESPACES={{ cifmw_os_must_gather_additional_namespaces }} OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1 || { rc=$? if [ $rc -eq 124 ]; then echo "The must gather command did not finish on time!" echo "{{ shell_cmd_timeout }} seconds was not enough to finish the task." fi }] *** 2025-12-01 09:00:58,112 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.183) 1:38:32.071 ******* 2025-12-01 09:00:58,112 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.183) 1:38:32.070 ******* 2025-12-01 09:00:58,175 p=37141 u=zuul n=ansible | fatal: [localhost]: FAILED! => msg: 'An unhandled exception occurred while templating ''{{ (cifmw_os_must_gather_timeout | community.general.to_seconds) + 900 }}''. Error was a , original message: ''int'' object has no attribute ''split''' 2025-12-01 09:00:58,176 p=37141 u=zuul n=ansible | ...ignoring 2025-12-01 09:00:58,198 p=37141 u=zuul n=ansible | TASK [os_must_gather : Find existing os-must-gather directories paths={{ cifmw_os_must_gather_output_log_dir }}, file_type=directory, depth=1] *** 2025-12-01 09:00:58,198 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.086) 1:38:32.157 ******* 2025-12-01 09:00:58,198 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.086) 1:38:32.156 ******* 2025-12-01 09:00:58,354 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:58,376 p=37141 u=zuul n=ansible | TASK [os_must_gather : Create a symlink to newest os-must-gather directory src={{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}, dest={{ cifmw_os_must_gather_output_log_dir }}/latest, state=link] *** 2025-12-01 09:00:58,377 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.178) 1:38:32.335 ******* 2025-12-01 09:00:58,377 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.178) 1:38:32.335 ******* 2025-12-01 09:00:58,403 p=37141 u=zuul n=ansible | fatal: [localhost]: FAILED! => msg: | The task includes an option with an undefined variable. The error was: Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined. Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined The error appears to be in '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/os_must_gather/tasks/main.yml': line 95, column 7, but may be elsewhere in the file depending on the exact syntax problem. The offending line appears to be: - name: Create a symlink to newest os-must-gather directory ^ here 2025-12-01 09:00:58,403 p=37141 u=zuul n=ansible | ...ignoring 2025-12-01 09:00:58,444 p=37141 u=zuul n=ansible | TASK [artifacts : Create crc logs directory path={{ cifmw_artifacts_basedir }}/logs/crc, state=directory, mode=0755] *** 2025-12-01 09:00:58,444 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.067) 1:38:32.402 ******* 2025-12-01 09:00:58,444 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.067) 1:38:32.402 ******* 2025-12-01 09:00:58,457 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:58,478 p=37141 u=zuul n=ansible | TASK [artifacts : Ensure controller knows CRC ssh keys _raw_params=ssh-keyscan {{ cifmw_artifacts_crc_host }} >> ~/.ssh/known_hosts] *** 2025-12-01 09:00:58,478 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.034) 1:38:32.437 ******* 2025-12-01 09:00:58,478 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.034) 1:38:32.436 ******* 2025-12-01 09:00:58,491 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:58,513 p=37141 u=zuul n=ansible | TASK [artifacts : Recognize new keypair path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-12-01 09:00:58,513 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.034) 1:38:32.472 ******* 2025-12-01 09:00:58,513 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.034) 1:38:32.471 ******* 2025-12-01 09:00:58,526 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:58,549 p=37141 u=zuul n=ansible | TASK [artifacts : Set fact if new keypair exists new_keypair_path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-12-01 09:00:58,549 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.035) 1:38:32.507 ******* 2025-12-01 09:00:58,549 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.035) 1:38:32.507 ******* 2025-12-01 09:00:58,562 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:58,626 p=37141 u=zuul n=ansible | TASK [artifacts : Prepare root ssh accesses output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=ssh -i {{ new_keypair_path | default(cifmw_artifacts_crc_sshkey) }} {{ cifmw_artifacts_crc_user }}@{{ cifmw_artifacts_crc_host }} < /tmp/{{ host_ip }}/ovs_vsctl_list_openvswitch.txt sudo ip netns > /tmp/{{ host_ip }}/ip_netns.txt sudo ip a > /tmp/{{ host_ip }}/network.txt sudo ip ro ls >> /tmp/{{ host_ip }}/network.txt sudo rpm -qa > /tmp/{{ host_ip }}/rpm_qa.txt sudo dnf list installed > /tmp/{{ host_ip }}/dnf_list_installed.txt sudo podman images --digests > /tmp/{{ host_ip }}/podman_images.txt sudo fips-mode-setup --check > /tmp/{{ host_ip }}/fips_check.txt mkdir -p /tmp/{{ host_ip }}/service_logs systemctl list-units | awk '/virt|edpm|ovs/ {print $1}' | egrep -v "sys|ovs-delete-transient-ports" | xargs -I {} sudo bash -c 'journalctl -u {} > /tmp/{{ host_ip }}/service_logs/{}.log' sudo ausearch -i | grep denied > /tmp/{{ host_ip }}/selinux-denials.log || true sudo journalctl -p warning -t kernel -o short -g DROPPING --no-pager &> /tmp/{{ host_ip }}/firewall-drops.txt || true EOF] *** 2025-12-01 09:00:58,999 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.055) 1:38:32.957 ******* 2025-12-01 09:00:58,999 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:58 +0000 (0:00:00.055) 1:38:32.957 ******* 2025-12-01 09:00:59,021 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:59,044 p=37141 u=zuul n=ansible | TASK [artifacts : Copy logs to host machine from {{ item.split('/')[0] }} output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=rsync -a -e "ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i {{ ssh_key_file }}" {{ ssh_user }}@{{ host_ip }}:/tmp/{{ host_ip }} {{ cifmw_artifacts_basedir }}/logs/;] *** 2025-12-01 09:00:59,044 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.045) 1:38:33.003 ******* 2025-12-01 09:00:59,044 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.045) 1:38:33.002 ******* 2025-12-01 09:00:59,064 p=37141 u=zuul n=ansible | skipping: [localhost] 2025-12-01 09:00:59,085 p=37141 u=zuul n=ansible | TASK [artifacts : Generate list of ansible logs to collect in home directory paths={{ ansible_user_dir }}, patterns=*ansible*.log] *** 2025-12-01 09:00:59,086 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.041) 1:38:33.044 ******* 2025-12-01 09:00:59,086 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.041) 1:38:33.044 ******* 2025-12-01 09:00:59,231 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:00:59,254 p=37141 u=zuul n=ansible | TASK [artifacts : Copy ansible logs to logs directory src={{ item.path }}, dest={{ cifmw_artifacts_basedir }}/logs/, remote_src=True, mode=0644] *** 2025-12-01 09:00:59,254 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.168) 1:38:33.213 ******* 2025-12-01 09:00:59,254 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.168) 1:38:33.212 ******* 2025-12-01 09:00:59,446 p=37141 u=zuul n=ansible | changed: [localhost] => (item={'path': '/home/zuul/ansible.log', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 1000, 'gid': 1000, 'size': 513551, 'inode': 4333416, 'dev': 64513, 'nlink': 1, 'atime': 1764571899.2233498, 'mtime': 1764579659.0846379, 'ctime': 1764579659.0846379, 'gr_name': 'zuul', 'pw_name': 'zuul', 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False}) 2025-12-01 09:00:59,469 p=37141 u=zuul n=ansible | TASK [artifacts : Ensure we have proper rights on the gathered content _raw_params=find {{ cifmw_artifacts_basedir }}/logs -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/logs -type d -exec chmod 0755 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type d -exec chmod 0755 '{}' \;] *** 2025-12-01 09:00:59,470 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.215) 1:38:33.428 ******* 2025-12-01 09:00:59,470 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:00:59 +0000 (0:00:00.215) 1:38:33.428 ******* 2025-12-01 09:01:00,150 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:00,171 p=37141 u=zuul n=ansible | TASK [artifacts : Mask secrets in yaml log files path={{ item }}, isdir=True] *** 2025-12-01 09:01:00,171 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:00 +0000 (0:00:00.701) 1:38:34.129 ******* 2025-12-01 09:01:00,171 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:00 +0000 (0:00:00.701) 1:38:34.129 ******* 2025-12-01 09:01:00,547 p=37141 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-12-01 09:01:02,255 p=37141 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-12-01 09:01:02,296 p=37141 u=zuul n=ansible | TASK [env_op_images : Ensure directory is present path={{ cifmw_env_op_images_dir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-01 09:01:02,296 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:02.125) 1:38:36.255 ******* 2025-12-01 09:01:02,296 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:02.125) 1:38:36.254 ******* 2025-12-01 09:01:02,455 p=37141 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2025-12-01 09:01:02,593 p=37141 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-12-01 09:01:02,617 p=37141 u=zuul n=ansible | TASK [env_op_images : Check if OpenStackControlPlane is setup _raw_params=oc get OpenStackControlPlane -o=jsonpath='{.items[*].status.conditions[?(@.type=="Ready")].status}'] *** 2025-12-01 09:01:02,617 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:00.320) 1:38:36.575 ******* 2025-12-01 09:01:02,617 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:00.320) 1:38:36.575 ******* 2025-12-01 09:01:02,880 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:02,903 p=37141 u=zuul n=ansible | TASK [env_op_images : Get images from the CSV _raw_params=oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o yaml] *** 2025-12-01 09:01:02,903 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:00.285) 1:38:36.861 ******* 2025-12-01 09:01:02,903 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:02 +0000 (0:00:00.285) 1:38:36.861 ******* 2025-12-01 09:01:03,178 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:03,239 p=37141 u=zuul n=ansible | TASK [env_op_images : Get the images name executable=/bin/bash, _raw_params=set -o pipefail; oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o json | jq -r ' [.items[]? | .spec.install.spec.deployments[]? | .spec.template.spec.containers[]? | .env[]? | select(.name? | test("^RELATED_IMAGE")) | select(.name | contains("MANAGER")) | {(.name): .value} ]' ] *** 2025-12-01 09:01:03,239 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.336) 1:38:37.198 ******* 2025-12-01 09:01:03,239 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.336) 1:38:37.197 ******* 2025-12-01 09:01:03,512 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:03,536 p=37141 u=zuul n=ansible | TASK [env_op_images : Extract env variable name and images cifmw_openstack_service_images_content={{ _sa_images_content.stdout | from_json }}] *** 2025-12-01 09:01:03,536 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.296) 1:38:37.494 ******* 2025-12-01 09:01:03,536 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.296) 1:38:37.494 ******* 2025-12-01 09:01:03,561 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:03,584 p=37141 u=zuul n=ansible | TASK [env_op_images : Get all pods from all namespaces to find openstack-operator-index kind=Pod, api_version=v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, field_selectors=['status.phase=Running']] *** 2025-12-01 09:01:03,584 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.048) 1:38:37.543 ******* 2025-12-01 09:01:03,584 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:03 +0000 (0:00:00.048) 1:38:37.542 ******* 2025-12-01 09:01:05,775 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:06,271 p=37141 u=zuul n=ansible | TASK [env_op_images : Retrieve openstack-operator-index pod cifmw_install_yamls_vars_content={'OPENSTACK_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}] *** 2025-12-01 09:01:06,271 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:06 +0000 (0:00:02.687) 1:38:40.230 ******* 2025-12-01 09:01:06,271 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:06 +0000 (0:00:02.687) 1:38:40.229 ******* 2025-12-01 09:01:06,413 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:06,447 p=37141 u=zuul n=ansible | TASK [env_op_images : Get all the pods in openstack-operator namespace kind=Pod, namespace={{ ((csv_items | first).metadata.namespace) if csv_items | length > 0 else omit }}, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, field_selectors=['status.phase=Running']] *** 2025-12-01 09:01:06,447 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:06 +0000 (0:00:00.175) 1:38:40.406 ******* 2025-12-01 09:01:06,447 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:06 +0000 (0:00:00.175) 1:38:40.405 ******* 2025-12-01 09:01:07,355 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:07,442 p=37141 u=zuul n=ansible | TASK [env_op_images : Get operator images and pods cifmw_openstack_operator_images_content={'RABBITMQ_OP_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}, selected_pods={{ pod_list.resources | rejectattr('metadata.generateName', 'contains', 'openstack-operator-index-') | rejectattr('metadata.generateName', 'contains', 'rabbitmq-cluster-operator-') | rejectattr('metadata.generateName', 'contains', 'watcher-operator-index-') }}] *** 2025-12-01 09:01:07,442 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:07 +0000 (0:00:00.994) 1:38:41.401 ******* 2025-12-01 09:01:07,442 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:07 +0000 (0:00:00.994) 1:38:41.400 ******* 2025-12-01 09:01:07,695 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:07,757 p=37141 u=zuul n=ansible | TASK [env_op_images : Add operator images to the dictionary cifmw_openstack_operator_images_content={{ cifmw_openstack_operator_images_content | combine( { item.metadata.labels['openstack.org/operator-name'] | upper ~ '_OP_IMG': (item.status.containerStatuses | last).imageID } ) }}] *** 2025-12-01 09:01:07,757 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:07 +0000 (0:00:00.314) 1:38:41.715 ******* 2025-12-01 09:01:07,757 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:07 +0000 (0:00:00.314) 1:38:41.715 ******* 2025-12-01 09:01:07,828 p=37141 u=zuul n=ansible | ok: [localhost] => (item=barbican-operator-controller-manager-7d9dfd778-pb8hs) 2025-12-01 09:01:07,840 p=37141 u=zuul n=ansible | ok: [localhost] => (item=cinder-operator-controller-manager-859b6ccc6-jp4gs) 2025-12-01 09:01:07,853 p=37141 u=zuul n=ansible | ok: [localhost] => (item=designate-operator-controller-manager-78b4bc895b-q8mcc) 2025-12-01 09:01:07,867 p=37141 u=zuul n=ansible | ok: [localhost] => (item=glance-operator-controller-manager-668d9c48b9-hgnd6) 2025-12-01 09:01:07,880 p=37141 u=zuul n=ansible | ok: [localhost] => (item=heat-operator-controller-manager-5f64f6f8bb-vs72h) 2025-12-01 09:01:07,894 p=37141 u=zuul n=ansible | ok: [localhost] => (item=horizon-operator-controller-manager-68c6d99b8f-gzrtt) 2025-12-01 09:01:07,906 p=37141 u=zuul n=ansible | ok: [localhost] => (item=infra-operator-controller-manager-57548d458d-dq2bs) 2025-12-01 09:01:07,919 p=37141 u=zuul n=ansible | ok: [localhost] => (item=ironic-operator-controller-manager-6c548fd776-fx5hl) 2025-12-01 09:01:07,933 p=37141 u=zuul n=ansible | ok: [localhost] => (item=keystone-operator-controller-manager-546d4bdf48-68rzf) 2025-12-01 09:01:07,946 p=37141 u=zuul n=ansible | ok: [localhost] => (item=manila-operator-controller-manager-6546668bfd-gqrjn) 2025-12-01 09:01:07,959 p=37141 u=zuul n=ansible | ok: [localhost] => (item=mariadb-operator-controller-manager-56bbcc9d85-ntcnc) 2025-12-01 09:01:07,972 p=37141 u=zuul n=ansible | ok: [localhost] => (item=neutron-operator-controller-manager-5fdfd5b6b5-6zthf) 2025-12-01 09:01:07,985 p=37141 u=zuul n=ansible | ok: [localhost] => (item=nova-operator-controller-manager-697bc559fc-j2sd7) 2025-12-01 09:01:07,998 p=37141 u=zuul n=ansible | ok: [localhost] => (item=octavia-operator-controller-manager-998648c74-gdcrj) 2025-12-01 09:01:08,016 p=37141 u=zuul n=ansible | ok: [localhost] => (item=openstack-baremetal-operator-controller-manager-6698bcb446l9cmv) 2025-12-01 09:01:08,031 p=37141 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-manager-656fd97d56-snxjz) 2025-12-01 09:01:08,048 p=37141 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-operator-6ddddd9d6f-nnr9w) 2025-12-01 09:01:08,059 p=37141 u=zuul n=ansible | ok: [localhost] => (item=ovn-operator-controller-manager-b6456fdb6-h4b6d) 2025-12-01 09:01:08,072 p=37141 u=zuul n=ansible | ok: [localhost] => (item=placement-operator-controller-manager-78f8948974-xmvng) 2025-12-01 09:01:08,086 p=37141 u=zuul n=ansible | ok: [localhost] => (item=swift-operator-controller-manager-5f8c65bbfc-s9l8p) 2025-12-01 09:01:08,099 p=37141 u=zuul n=ansible | ok: [localhost] => (item=telemetry-operator-controller-manager-76cc84c6bb-hmlcg) 2025-12-01 09:01:08,112 p=37141 u=zuul n=ansible | ok: [localhost] => (item=test-operator-controller-manager-5854674fcc-gdfbn) 2025-12-01 09:01:08,127 p=37141 u=zuul n=ansible | ok: [localhost] => (item=watcher-operator-controller-manager-769dc69bc-vhpbl) 2025-12-01 09:01:08,308 p=37141 u=zuul n=ansible | TASK [env_op_images : Write images to file dest={{ cifmw_env_op_images_dir }}/artifacts/{{ cifmw_env_op_images_file }}, content={{ _content | to_nice_yaml }}, mode=0644] *** 2025-12-01 09:01:08,308 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.551) 1:38:42.267 ******* 2025-12-01 09:01:08,308 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.551) 1:38:42.266 ******* 2025-12-01 09:01:08,646 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:08,689 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Create a versioned log folder path={{ logfiles_dest_dir }}, state=directory, mode=0775] *** 2025-12-01 09:01:08,689 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.380) 1:38:42.648 ******* 2025-12-01 09:01:08,689 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.380) 1:38:42.647 ******* 2025-12-01 09:01:08,842 p=37141 u=zuul n=ansible | changed: [localhost] 2025-12-01 09:01:08,863 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Return a list of log files in home directory paths={{ ansible_user_dir }}, patterns=*.log] *** 2025-12-01 09:01:08,864 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.174) 1:38:42.822 ******* 2025-12-01 09:01:08,864 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:08 +0000 (0:00:00.174) 1:38:42.822 ******* 2025-12-01 09:01:09,009 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:09,032 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Ensure ansible facts cache exists path={{ ansible_user_dir }}/ansible_facts_cache] *** 2025-12-01 09:01:09,032 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:09 +0000 (0:00:00.168) 1:38:42.990 ******* 2025-12-01 09:01:09,032 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:09 +0000 (0:00:00.168) 1:38:42.990 ******* 2025-12-01 09:01:09,185 p=37141 u=zuul n=ansible | ok: [localhost] 2025-12-01 09:01:09,207 p=37141 u=zuul n=ansible | TASK [cifmw_setup : Copy logs to proper location src={{ item.path }}, dest={{ [ logfiles_dest_dir , item.path | basename ] | path_join }}, remote_src=True, mode=0666] *** 2025-12-01 09:01:09,207 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:09 +0000 (0:00:00.175) 1:38:43.166 ******* 2025-12-01 09:01:09,207 p=37141 u=zuul n=ansible | Monday 01 December 2025 09:01:09 +0000 (0:00:00.175) 1:38:43.165 *******