2025-10-02 11:26:36,887 p=27537 u=zuul n=ansible | Starting galaxy collection install process 2025-10-02 11:26:36,888 p=27537 u=zuul n=ansible | Process install dependency map 2025-10-02 11:26:50,792 p=27537 u=zuul n=ansible | Starting collection install process 2025-10-02 11:26:50,792 p=27537 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+2a995b7c' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-10-02 11:26:51,279 p=27537 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+2a995b7c at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-10-02 11:26:51,279 p=27537 u=zuul n=ansible | cifmw.general:1.0.0+2a995b7c was installed successfully 2025-10-02 11:26:51,279 p=27537 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-10-02 11:26:51,344 p=27537 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-10-02 11:26:51,344 p=27537 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-10-02 11:26:51,344 p=27537 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-10-02 11:26:52,098 p=27537 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-10-02 11:26:52,098 p=27537 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-10-02 11:26:52,098 p=27537 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-10-02 11:26:52,147 p=27537 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-10-02 11:26:52,147 p=27537 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-10-02 11:26:52,147 p=27537 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-10-02 11:26:52,255 p=27537 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-10-02 11:26:52,255 p=27537 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-10-02 11:26:52,255 p=27537 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-10-02 11:26:52,281 p=27537 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-10-02 11:26:52,281 p=27537 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-10-02 11:26:52,281 p=27537 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-10-02 11:26:52,420 p=27537 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-10-02 11:26:52,420 p=27537 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-10-02 11:26:52,420 p=27537 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-10-02 11:26:52,538 p=27537 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-10-02 11:26:52,538 p=27537 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-10-02 11:26:52,538 p=27537 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-10-02 11:26:52,605 p=27537 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-10-02 11:26:52,605 p=27537 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-10-02 11:26:52,605 p=27537 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-10-02 11:26:52,622 p=27537 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-10-02 11:26:52,623 p=27537 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-10-02 11:26:52,623 p=27537 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-10-02 11:26:52,861 p=27537 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-10-02 11:26:52,862 p=27537 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-10-02 11:26:52,862 p=27537 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-10-02 11:26:53,124 p=27537 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-10-02 11:26:53,124 p=27537 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-10-02 11:26:53,124 p=27537 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-10-02 11:26:53,156 p=27537 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-10-02 11:26:53,156 p=27537 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-10-02 11:26:53,156 p=27537 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-10-02 11:26:53,184 p=27537 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-10-02 11:26:53,185 p=27537 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-10-02 11:26:53,185 p=27537 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-10-02 11:26:53,276 p=27537 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-10-02 11:26:53,276 p=27537 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-10-02 11:27:02,934 p=28172 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-10-02 11:27:02,953 p=28172 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-10-02 11:27:02,954 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:02 +0000 (0:00:00.036) 0:00:00.036 ****** 2025-10-02 11:27:03,927 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:03,946 p=28172 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-10-02 11:27:03,946 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:03 +0000 (0:00:00.992) 0:00:01.028 ****** 2025-10-02 11:27:04,258 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:04,264 p=28172 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-10-02 11:27:04,264 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.317) 0:00:01.346 ****** 2025-10-02 11:27:04,282 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-10-02 11:27:04,335 p=28172 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-10-02 11:27:04,335 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.070) 0:00:01.417 ****** 2025-10-02 11:27:04,357 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:04,365 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 11:27:04,365 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.029) 0:00:01.447 ****** 2025-10-02 11:27:04,390 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:04,396 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-10-02 11:27:04,396 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.030) 0:00:01.478 ****** 2025-10-02 11:27:04,466 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:04,473 p=28172 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-10-02 11:27:04,473 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.077) 0:00:01.555 ****** 2025-10-02 11:27:04,671 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:04,679 p=28172 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-10-02 11:27:04,679 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.206) 0:00:01.761 ****** 2025-10-02 11:27:04,697 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:04,704 p=28172 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-10-02 11:27:04,704 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.025) 0:00:01.786 ****** 2025-10-02 11:27:04,723 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:04,730 p=28172 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-10-02 11:27:04,730 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.025) 0:00:01.812 ****** 2025-10-02 11:27:04,749 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:04,756 p=28172 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-10-02 11:27:04,756 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:04 +0000 (0:00:00.025) 0:00:01.838 ****** 2025-10-02 11:27:06,235 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:06,247 p=28172 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 11:27:06,247 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:06 +0000 (0:00:01.491) 0:00:03.329 ****** 2025-10-02 11:27:06,457 p=28172 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-10-02 11:27:06,649 p=28172 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-10-02 11:27:06,820 p=28172 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-10-02 11:27:06,828 p=28172 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-10-02 11:27:06,828 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:06 +0000 (0:00:00.581) 0:00:03.910 ****** 2025-10-02 11:27:07,906 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:07,914 p=28172 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-10-02 11:27:07,915 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:07 +0000 (0:00:01.086) 0:00:04.997 ****** 2025-10-02 11:27:08,944 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:08,951 p=28172 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-10-02 11:27:08,952 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:08 +0000 (0:00:01.036) 0:00:06.034 ****** 2025-10-02 11:27:18,742 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:18,748 p=28172 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-10-02 11:27:18,748 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:18 +0000 (0:00:09.796) 0:00:15.830 ****** 2025-10-02 11:27:19,533 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:19,539 p=28172 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-10-02 11:27:19,539 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:19 +0000 (0:00:00.790) 0:00:16.621 ****** 2025-10-02 11:27:19,561 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:19,568 p=28172 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-10-02 11:27:19,569 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:19 +0000 (0:00:00.029) 0:00:16.651 ****** 2025-10-02 11:27:20,167 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:20,173 p=28172 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-10-02 11:27:20,173 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:20 +0000 (0:00:00.604) 0:00:17.255 ****** 2025-10-02 11:27:20,206 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:20,213 p=28172 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-10-02 11:27:20,213 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:20 +0000 (0:00:00.039) 0:00:17.295 ****** 2025-10-02 11:27:20,245 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:20,252 p=28172 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-10-02 11:27:20,252 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:20 +0000 (0:00:00.039) 0:00:17.334 ****** 2025-10-02 11:27:20,285 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:20,291 p=28172 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-10-02 11:27:20,291 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:20 +0000 (0:00:00.039) 0:00:17.373 ****** 2025-10-02 11:27:20,772 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:20,779 p=28172 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 11:27:20,780 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:20 +0000 (0:00:00.488) 0:00:17.862 ****** 2025-10-02 11:27:21,467 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:21,473 p=28172 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 11:27:21,473 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.693) 0:00:18.555 ****** 2025-10-02 11:27:21,487 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,494 p=28172 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-10-02 11:27:21,494 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.020) 0:00:18.576 ****** 2025-10-02 11:27:21,508 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,516 p=28172 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-10-02 11:27:21,516 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.021) 0:00:18.598 ****** 2025-10-02 11:27:21,531 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,537 p=28172 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-10-02 11:27:21,537 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.021) 0:00:18.619 ****** 2025-10-02 11:27:21,561 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:21,567 p=28172 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-10-02 11:27:21,568 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.030) 0:00:18.650 ****** 2025-10-02 11:27:21,580 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,587 p=28172 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-10-02 11:27:21,587 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.019) 0:00:18.669 ****** 2025-10-02 11:27:21,599 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,605 p=28172 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-10-02 11:27:21,605 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.018) 0:00:18.687 ****** 2025-10-02 11:27:21,618 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,625 p=28172 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-10-02 11:27:21,626 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.020) 0:00:18.708 ****** 2025-10-02 11:27:21,637 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,645 p=28172 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-10-02 11:27:21,645 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.019) 0:00:18.727 ****** 2025-10-02 11:27:21,656 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,662 p=28172 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-10-02 11:27:21,662 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.017) 0:00:18.744 ****** 2025-10-02 11:27:21,675 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,686 p=28172 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-10-02 11:27:21,686 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.023) 0:00:18.768 ****** 2025-10-02 11:27:21,703 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:21,712 p=28172 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-10-02 11:27:21,712 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.025) 0:00:18.794 ****** 2025-10-02 11:27:21,982 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:21,990 p=28172 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-10-02 11:27:21,990 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:21 +0000 (0:00:00.277) 0:00:19.072 ****** 2025-10-02 11:27:22,192 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:22,199 p=28172 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-10-02 11:27:22,199 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:22 +0000 (0:00:00.208) 0:00:19.281 ****** 2025-10-02 11:27:22,428 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:22,435 p=28172 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-10-02 11:27:22,435 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:22 +0000 (0:00:00.236) 0:00:19.517 ****** 2025-10-02 11:27:22,979 p=28172 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.129.56.134:8766/gating.repo 2025-10-02 11:27:22,980 p=28172 u=zuul n=ansible | ...ignoring 2025-10-02 11:27:22,987 p=28172 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-10-02 11:27:22,987 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:22 +0000 (0:00:00.552) 0:00:20.069 ****** 2025-10-02 11:27:23,018 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:23,029 p=28172 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-10-02 11:27:23,029 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.041) 0:00:20.111 ****** 2025-10-02 11:27:23,058 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:23,064 p=28172 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-10-02 11:27:23,064 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.035) 0:00:20.146 ****** 2025-10-02 11:27:23,092 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:23,099 p=28172 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-10-02 11:27:23,099 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.034) 0:00:20.181 ****** 2025-10-02 11:27:23,129 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:23,135 p=28172 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-10-02 11:27:23,136 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.036) 0:00:20.218 ****** 2025-10-02 11:27:23,169 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:23,176 p=28172 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-10-02 11:27:23,176 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.040) 0:00:20.258 ****** 2025-10-02 11:27:23,489 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:23,498 p=28172 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-10-02 11:27:23,498 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.322) 0:00:20.580 ****** 2025-10-02 11:27:23,718 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-10-02 11:27:23,924 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-10-02 11:27:23,933 p=28172 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-10-02 11:27:23,933 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:23 +0000 (0:00:00.434) 0:00:21.015 ****** 2025-10-02 11:27:24,341 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:24,348 p=28172 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-10-02 11:27:24,348 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:24 +0000 (0:00:00.415) 0:00:21.430 ****** 2025-10-02 11:27:24,608 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:24,625 p=28172 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-10-02 11:27:24,625 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:24 +0000 (0:00:00.277) 0:00:21.707 ****** 2025-10-02 11:27:24,660 p=28172 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-10-02 11:27:24,667 p=28172 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-10-02 11:27:24,667 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:24 +0000 (0:00:00.041) 0:00:21.749 ****** 2025-10-02 11:27:24,682 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-10-02 11:27:24,688 p=28172 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-10-02 11:27:24,688 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:24 +0000 (0:00:00.021) 0:00:21.770 ****** 2025-10-02 11:27:53,130 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:53,137 p=28172 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-10-02 11:27:53,137 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:53 +0000 (0:00:28.448) 0:00:50.219 ****** 2025-10-02 11:27:53,346 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:27:53,353 p=28172 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-10-02 11:27:53,353 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:53 +0000 (0:00:00.216) 0:00:50.435 ****** 2025-10-02 11:27:53,536 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:53,543 p=28172 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-10-02 11:27:53,544 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:53 +0000 (0:00:00.190) 0:00:50.626 ****** 2025-10-02 11:27:58,789 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:58,796 p=28172 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 11:27:58,796 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:58 +0000 (0:00:05.251) 0:00:55.878 ****** 2025-10-02 11:27:58,823 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:58,829 p=28172 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-10-02 11:27:58,830 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:58 +0000 (0:00:00.033) 0:00:55.912 ****** 2025-10-02 11:27:59,116 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:59,123 p=28172 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-10-02 11:27:59,123 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.293) 0:00:56.205 ****** 2025-10-02 11:27:59,432 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:27:59,439 p=28172 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-10-02 11:27:59,439 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.316) 0:00:56.521 ****** 2025-10-02 11:27:59,453 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,459 p=28172 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-10-02 11:27:59,460 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.020) 0:00:56.541 ****** 2025-10-02 11:27:59,475 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,482 p=28172 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-10-02 11:27:59,482 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.022) 0:00:56.564 ****** 2025-10-02 11:27:59,496 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,502 p=28172 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-10-02 11:27:59,502 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.020) 0:00:56.584 ****** 2025-10-02 11:27:59,514 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,521 p=28172 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-10-02 11:27:59,521 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.019) 0:00:56.603 ****** 2025-10-02 11:27:59,536 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,544 p=28172 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-10-02 11:27:59,544 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.022) 0:00:56.626 ****** 2025-10-02 11:27:59,568 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:27:59,576 p=28172 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-10-02 11:27:59,576 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:27:59 +0000 (0:00:00.032) 0:00:56.658 ****** 2025-10-02 11:27:59,818 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-10-02 11:28:00,074 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-10-02 11:28:00,268 p=28172 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-10-02 11:28:00,479 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-10-02 11:28:00,690 p=28172 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 11:28:00,704 p=28172 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-10-02 11:28:00,704 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:00 +0000 (0:00:01.127) 0:00:57.786 ****** 2025-10-02 11:28:00,860 p=28172 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-10-02 11:28:00,860 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:00 +0000 (0:00:00.156) 0:00:57.942 ****** 2025-10-02 11:28:01,075 p=28172 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-10-02 11:28:01,261 p=28172 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-10-02 11:28:01,437 p=28172 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 11:28:01,443 p=28172 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-10-02 11:28:01,443 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.582) 0:00:58.525 ****** 2025-10-02 11:28:01,475 p=28172 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-10-02 11:28:01,475 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.031) 0:00:58.557 ****** 2025-10-02 11:28:01,524 p=28172 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2025-10-02 11:28:01,531 p=28172 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-10-02 11:28:01,531 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.056) 0:00:58.613 ****** 2025-10-02 11:28:01,578 p=28172 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) => msg: | _repo_operator_name: watcher _repo_operator_info: [{'key': 'WATCHER_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, {'key': 'WATCHER_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'WATCHER_BRANCH': ''} 2025-10-02 11:28:01,591 p=28172 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-10-02 11:28:01,591 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.059) 0:00:58.673 ****** 2025-10-02 11:28:01,676 p=28172 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2025-10-02 11:28:01,685 p=28172 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-10-02 11:28:01,685 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.093) 0:00:58.767 ****** 2025-10-02 11:28:01,724 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:01,732 p=28172 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-10-02 11:28:01,732 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:01 +0000 (0:00:00.047) 0:00:58.814 ****** 2025-10-02 11:28:02,299 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:02,307 p=28172 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-10-02 11:28:02,307 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.575) 0:00:59.389 ****** 2025-10-02 11:28:02,492 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:02,500 p=28172 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-10-02 11:28:02,500 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.192) 0:00:59.582 ****** 2025-10-02 11:28:02,533 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:02,548 p=28172 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-10-02 11:28:02,549 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.048) 0:00:59.631 ****** 2025-10-02 11:28:02,919 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:02,925 p=28172 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-10-02 11:28:02,925 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.376) 0:01:00.007 ****** 2025-10-02 11:28:02,947 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:02,954 p=28172 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-10-02 11:28:02,955 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.029) 0:01:00.037 ****** 2025-10-02 11:28:02,971 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:28:02,977 p=28172 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-10-02 11:28:02,978 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:02 +0000 (0:00:00.023) 0:01:00.060 ****** 2025-10-02 11:28:03,004 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '1234567842' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12345678' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: osp-secret SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: tests/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' 2025-10-02 11:28:03,011 p=28172 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-10-02 11:28:03,012 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:03 +0000 (0:00:00.033) 0:01:00.094 ****** 2025-10-02 11:28:03,337 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:03,347 p=28172 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-10-02 11:28:03,347 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:03 +0000 (0:00:00.335) 0:01:00.429 ****** 2025-10-02 11:28:03,368 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-10-02 11:28:03,379 p=28172 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-10-02 11:28:03,379 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:03 +0000 (0:00:00.032) 0:01:00.461 ****** 2025-10-02 11:28:03,761 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:03,771 p=28172 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-10-02 11:28:03,771 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:03 +0000 (0:00:00.391) 0:01:00.853 ****** 2025-10-02 11:28:03,792 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:03,807 p=28172 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-10-02 11:28:03,807 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:03 +0000 (0:00:00.036) 0:01:00.889 ****** 2025-10-02 11:28:04,166 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:04,177 p=28172 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-10-02 11:28:04,177 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:04 +0000 (0:00:00.369) 0:01:01.259 ****** 2025-10-02 11:28:04,201 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:04,218 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-10-02 11:28:04,218 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:04 +0000 (0:00:00.040) 0:01:01.300 ****** 2025-10-02 11:28:04,678 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:04,693 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:28:04,694 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:04 +0000 (0:00:00.475) 0:01:01.776 ****** 2025-10-02 11:28:04,757 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:04,765 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:28:04,765 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:04 +0000 (0:00:00.071) 0:01:01.847 ****** 2025-10-02 11:28:04,920 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:04,931 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:28:04,931 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:04 +0000 (0:00:00.166) 0:01:02.013 ****** 2025-10-02 11:28:05,149 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-10-02 11:28:05,160 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 11:28:05,161 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.229) 0:01:02.243 ****** 2025-10-02 11:28:05,205 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:05,213 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 11:28:05,213 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.052) 0:01:02.295 ****** 2025-10-02 11:28:05,403 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:05,411 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 11:28:05,411 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.197) 0:01:02.493 ****** 2025-10-02 11:28:05,424 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:05,433 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 11:28:05,433 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.022) 0:01:02.515 ****** 2025-10-02 11:28:05,624 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:05,632 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 11:28:05,632 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.198) 0:01:02.714 ****** 2025-10-02 11:28:05,647 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:05,654 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 11:28:05,655 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.022) 0:01:02.736 ****** 2025-10-02 11:28:05,852 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:05,859 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:28:05,859 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:05 +0000 (0:00:00.204) 0:01:02.941 ****** 2025-10-02 11:28:06,037 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:06,048 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-10-02 11:28:06,048 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:06 +0000 (0:00:00.188) 0:01:03.130 ****** 2025-10-02 11:28:06,099 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2025-10-02 11:28:41,167 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:41,178 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-10-02 11:28:41,178 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:35.129) 0:01:38.260 ****** 2025-10-02 11:28:41,198 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:41,209 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:28:41,209 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.031) 0:01:38.291 ****** 2025-10-02 11:28:41,387 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:41,396 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:28:41,396 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.186) 0:01:38.478 ****** 2025-10-02 11:28:41,414 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:41,461 p=28172 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-10-02 11:28:41,487 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:28:41,487 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.091) 0:01:38.569 ****** 2025-10-02 11:28:41,538 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:41,547 p=28172 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-10-02 11:28:41,547 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.060) 0:01:38.629 ****** 2025-10-02 11:28:41,574 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:41,585 p=28172 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-10-02 11:28:41,585 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.037) 0:01:38.667 ****** 2025-10-02 11:28:41,610 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:41,648 p=28172 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-10-02 11:28:41,689 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:28:41,689 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.104) 0:01:38.771 ****** 2025-10-02 11:28:41,751 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:41,760 p=28172 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 11:28:41,760 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.070) 0:01:38.842 ****** 2025-10-02 11:28:41,972 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:41,983 p=28172 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-10-02 11:28:41,983 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:41 +0000 (0:00:00.222) 0:01:39.065 ****** 2025-10-02 11:28:42,008 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,019 p=28172 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 11:28:42,019 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.035) 0:01:39.101 ****** 2025-10-02 11:28:42,046 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,058 p=28172 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-10-02 11:28:42,058 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.038) 0:01:39.140 ****** 2025-10-02 11:28:42,149 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,166 p=28172 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-10-02 11:28:42,167 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.108) 0:01:39.249 ****** 2025-10-02 11:28:42,190 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,197 p=28172 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-10-02 11:28:42,197 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.030) 0:01:39.279 ****** 2025-10-02 11:28:42,220 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,229 p=28172 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-10-02 11:28:42,229 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.031) 0:01:39.311 ****** 2025-10-02 11:28:42,251 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,261 p=28172 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:28:42,261 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.031) 0:01:39.343 ****** 2025-10-02 11:28:42,471 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:42,479 p=28172 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-10-02 11:28:42,479 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.218) 0:01:39.561 ****** 2025-10-02 11:28:42,512 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-10-02 11:28:42,525 p=28172 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 11:28:42,525 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.045) 0:01:39.607 ****** 2025-10-02 11:28:42,554 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,566 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 11:28:42,566 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.041) 0:01:39.648 ****** 2025-10-02 11:28:42,599 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,612 p=28172 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-10-02 11:28:42,612 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.046) 0:01:39.694 ****** 2025-10-02 11:28:42,642 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,653 p=28172 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-10-02 11:28:42,653 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.041) 0:01:39.735 ****** 2025-10-02 11:28:42,694 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:42,703 p=28172 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 11:28:42,703 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.049) 0:01:39.785 ****** 2025-10-02 11:28:42,891 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:42,910 p=28172 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-10-02 11:28:42,910 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.207) 0:01:39.992 ****** 2025-10-02 11:28:42,941 p=28172 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 11:28:42,952 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 11:28:42,953 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.042) 0:01:40.035 ****** 2025-10-02 11:28:42,978 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:42,991 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-10-02 11:28:42,991 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:42 +0000 (0:00:00.038) 0:01:40.073 ****** 2025-10-02 11:28:43,018 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:43,030 p=28172 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-10-02 11:28:43,030 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.038) 0:01:40.112 ****** 2025-10-02 11:28:43,054 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:43,063 p=28172 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-10-02 11:28:43,063 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.033) 0:01:40.145 ****** 2025-10-02 11:28:43,088 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:43,099 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-10-02 11:28:43,099 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.035) 0:01:40.181 ****** 2025-10-02 11:28:43,129 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-10-02 11:28:43,140 p=28172 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 11:28:43,140 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.041) 0:01:40.222 ****** 2025-10-02 11:28:43,164 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:43,175 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-10-02 11:28:43,175 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.034) 0:01:40.257 ****** 2025-10-02 11:28:43,231 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-10-02 11:28:43,605 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:43,616 p=28172 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-10-02 11:28:43,616 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.440) 0:01:40.698 ****** 2025-10-02 11:28:43,644 p=28172 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 11:28:43,656 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 11:28:43,656 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:43 +0000 (0:00:00.040) 0:01:40.738 ****** 2025-10-02 11:28:43,994 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:44,003 p=28172 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-10-02 11:28:44,003 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:44 +0000 (0:00:00.346) 0:01:41.085 ****** 2025-10-02 11:28:44,030 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:44,038 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-10-02 11:28:44,038 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:44 +0000 (0:00:00.035) 0:01:41.120 ****** 2025-10-02 11:28:44,347 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:44,355 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-10-02 11:28:44,355 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:44 +0000 (0:00:00.316) 0:01:41.437 ****** 2025-10-02 11:28:44,684 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:44,692 p=28172 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-10-02 11:28:44,692 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:44 +0000 (0:00:00.337) 0:01:41.774 ****** 2025-10-02 11:28:45,043 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:45,053 p=28172 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-10-02 11:28:45,053 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:45 +0000 (0:00:00.360) 0:01:42.135 ****** 2025-10-02 11:28:45,087 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:45,095 p=28172 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-10-02 11:28:45,095 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:45 +0000 (0:00:00.041) 0:01:42.177 ****** 2025-10-02 11:28:45,499 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:45,507 p=28172 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-10-02 11:28:45,507 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:45 +0000 (0:00:00.411) 0:01:42.589 ****** 2025-10-02 11:28:45,839 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:45,850 p=28172 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-10-02 11:28:45,850 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:45 +0000 (0:00:00.343) 0:01:42.932 ****** 2025-10-02 11:28:46,312 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:46,327 p=28172 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:28:46,327 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:46 +0000 (0:00:00.476) 0:01:43.409 ****** 2025-10-02 11:28:46,515 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:46,524 p=28172 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-10-02 11:28:46,524 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:46 +0000 (0:00:00.197) 0:01:43.606 ****** 2025-10-02 11:28:46,549 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:46,560 p=28172 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-10-02 11:28:46,560 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:46 +0000 (0:00:00.035) 0:01:43.642 ****** 2025-10-02 11:28:47,613 p=28172 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-10-02 11:28:48,400 p=28172 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-10-02 11:28:48,413 p=28172 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-10-02 11:28:48,413 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:01.853) 0:01:45.495 ****** 2025-10-02 11:28:48,432 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,440 p=28172 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-10-02 11:28:48,440 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.026) 0:01:45.522 ****** 2025-10-02 11:28:48,460 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-10-02 11:28:48,461 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-10-02 11:28:48,461 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,469 p=28172 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-10-02 11:28:48,469 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.029) 0:01:45.551 ****** 2025-10-02 11:28:48,492 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,502 p=28172 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-10-02 11:28:48,502 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.032) 0:01:45.584 ****** 2025-10-02 11:28:48,525 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,533 p=28172 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-10-02 11:28:48,534 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.031) 0:01:45.616 ****** 2025-10-02 11:28:48,554 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,563 p=28172 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-10-02 11:28:48,563 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.029) 0:01:45.645 ****** 2025-10-02 11:28:48,583 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,591 p=28172 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-10-02 11:28:48,591 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.028) 0:01:45.673 ****** 2025-10-02 11:28:48,611 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,620 p=28172 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-10-02 11:28:48,620 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.028) 0:01:45.702 ****** 2025-10-02 11:28:48,640 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,648 p=28172 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-10-02 11:28:48,648 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.028) 0:01:45.730 ****** 2025-10-02 11:28:48,668 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:48,679 p=28172 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-10-02 11:28:48,679 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:48 +0000 (0:00:00.030) 0:01:45.761 ****** 2025-10-02 11:28:49,501 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:49,511 p=28172 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-10-02 11:28:49,511 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:49 +0000 (0:00:00.832) 0:01:46.593 ****** 2025-10-02 11:28:49,536 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:49,545 p=28172 u=zuul n=ansible | TASK [openshift_setup : Metal3 tweaks _raw_params=metal3_config.yml] *********** 2025-10-02 11:28:49,545 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:49 +0000 (0:00:00.033) 0:01:46.627 ****** 2025-10-02 11:28:49,577 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_setup/tasks/metal3_config.yml for localhost 2025-10-02 11:28:49,589 p=28172 u=zuul n=ansible | TASK [openshift_setup : Fetch Metal3 configuration name _raw_params=oc get Provisioning -o name] *** 2025-10-02 11:28:49,589 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:49 +0000 (0:00:00.044) 0:01:46.671 ****** 2025-10-02 11:28:49,606 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:49,614 p=28172 u=zuul n=ansible | TASK [openshift_setup : Apply the patch to Metal3 Provisioning _raw_params=oc patch {{ _cifmw_openshift_setup_provisioning_name.stdout }} --type='json' -p='[{"op": "replace", "path": "/spec/watchAllNamespaces", "value": true}]'] *** 2025-10-02 11:28:49,614 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:49 +0000 (0:00:00.025) 0:01:46.696 ****** 2025-10-02 11:28:49,630 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:49,639 p=28172 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-10-02 11:28:49,639 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:49 +0000 (0:00:00.024) 0:01:46.721 ****** 2025-10-02 11:28:50,664 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:50,678 p=28172 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-10-02 11:28:50,678 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:50 +0000 (0:00:01.039) 0:01:47.760 ****** 2025-10-02 11:28:51,888 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:51,900 p=28172 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-10-02 11:28:51,900 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:51 +0000 (0:00:01.222) 0:01:48.982 ****** 2025-10-02 11:28:52,707 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:52,718 p=28172 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-10-02 11:28:52,719 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.818) 0:01:49.800 ****** 2025-10-02 11:28:52,739 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:52,749 p=28172 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-10-02 11:28:52,749 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.030) 0:01:49.831 ****** 2025-10-02 11:28:52,769 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:52,787 p=28172 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-10-02 11:28:52,788 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.038) 0:01:49.870 ****** 2025-10-02 11:28:52,813 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:52,822 p=28172 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-10-02 11:28:52,822 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.034) 0:01:49.904 ****** 2025-10-02 11:28:52,848 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:52,858 p=28172 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-10-02 11:28:52,858 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.035) 0:01:49.940 ****** 2025-10-02 11:28:52,956 p=28172 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 11:28:52,957 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:52 +0000 (0:00:00.098) 0:01:50.039 ****** 2025-10-02 11:28:53,194 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:53,205 p=28172 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-10-02 11:28:53,205 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:53 +0000 (0:00:00.248) 0:01:50.287 ****** 2025-10-02 11:28:53,945 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:53,953 p=28172 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-10-02 11:28:53,953 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:53 +0000 (0:00:00.748) 0:01:51.035 ****** 2025-10-02 11:28:53,980 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-10-02 11:28:53,991 p=28172 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-10-02 11:28:53,991 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:53 +0000 (0:00:00.038) 0:01:51.073 ****** 2025-10-02 11:28:54,688 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:54,701 p=28172 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-10-02 11:28:54,701 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:54 +0000 (0:00:00.709) 0:01:51.783 ****** 2025-10-02 11:28:57,784 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:28:57,808 p=28172 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-10-02 11:28:57,808 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:57 +0000 (0:00:03.107) 0:01:54.890 ****** 2025-10-02 11:28:57,827 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:28:57,840 p=28172 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-10-02 11:28:57,840 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:57 +0000 (0:00:00.031) 0:01:54.922 ****** 2025-10-02 11:28:58,675 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:28:58,684 p=28172 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-10-02 11:28:58,684 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:28:58 +0000 (0:00:00.843) 0:01:55.766 ****** 2025-10-02 11:29:09,474 p=28172 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-10-02 11:29:10,243 p=28172 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-10-02 11:29:10,989 p=28172 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-10-02 11:29:11,009 p=28172 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2025-10-02 11:29:11,009 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:11 +0000 (0:00:12.324) 0:02:08.091 ****** 2025-10-02 11:29:11,205 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:11,213 p=28172 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ lookup('env', 'HOME') }}/bin/cmctl, mode=0755] *** 2025-10-02 11:29:11,214 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:11 +0000 (0:00:00.204) 0:02:08.296 ****** 2025-10-02 11:29:12,320 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:29:12,330 p=28172 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ lookup('env', 'HOME') }}/bin/cmctl check api --wait=2m] *** 2025-10-02 11:29:12,330 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:01.116) 0:02:09.412 ****** 2025-10-02 11:29:12,615 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:29:12,629 p=28172 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-10-02 11:29:12,629 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.299) 0:02:09.711 ****** 2025-10-02 11:29:12,648 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:12,655 p=28172 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-10-02 11:29:12,655 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.025) 0:02:09.737 ****** 2025-10-02 11:29:12,671 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:12,678 p=28172 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-10-02 11:29:12,678 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.023) 0:02:09.760 ****** 2025-10-02 11:29:12,693 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:12,700 p=28172 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-10-02 11:29:12,701 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.022) 0:02:09.783 ****** 2025-10-02 11:29:12,716 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:12,723 p=28172 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-10-02 11:29:12,724 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.022) 0:02:09.806 ****** 2025-10-02 11:29:12,746 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:12,757 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:12,757 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.033) 0:02:09.839 ****** 2025-10-02 11:29:12,816 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:12,825 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:12,825 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.068) 0:02:09.907 ****** 2025-10-02 11:29:12,920 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:12,928 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:12,928 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:12 +0000 (0:00:00.103) 0:02:10.010 ****** 2025-10-02 11:29:13,048 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2025-10-02 11:29:13,064 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 11:29:13,064 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.135) 0:02:10.146 ****** 2025-10-02 11:29:13,111 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,121 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 11:29:13,121 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.056) 0:02:10.203 ****** 2025-10-02 11:29:13,315 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,325 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 11:29:13,325 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.204) 0:02:10.407 ****** 2025-10-02 11:29:13,339 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:13,349 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 11:29:13,349 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.023) 0:02:10.431 ****** 2025-10-02 11:29:13,523 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,531 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 11:29:13,531 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.181) 0:02:10.613 ****** 2025-10-02 11:29:13,549 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,558 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 11:29:13,558 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.027) 0:02:10.640 ****** 2025-10-02 11:29:13,748 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,757 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:29:13,757 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.198) 0:02:10.839 ****** 2025-10-02 11:29:13,962 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:13,971 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 11:29:13,971 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:13 +0000 (0:00:00.213) 0:02:11.053 ****** 2025-10-02 11:29:14,023 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log 2025-10-02 11:29:24,527 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:29:24,538 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 11:29:24,538 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:24 +0000 (0:00:10.567) 0:02:21.620 ****** 2025-10-02 11:29:24,563 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:24,574 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:29:24,574 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:24 +0000 (0:00:00.035) 0:02:21.656 ****** 2025-10-02 11:29:24,783 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:24,791 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:29:24,791 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:24 +0000 (0:00:00.217) 0:02:21.873 ****** 2025-10-02 11:29:24,828 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:24,849 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:24,849 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:24 +0000 (0:00:00.057) 0:02:21.931 ****** 2025-10-02 11:29:24,922 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:24,941 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:24,941 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:24 +0000 (0:00:00.092) 0:02:22.023 ****** 2025-10-02 11:29:25,042 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,057 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:25,057 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.115) 0:02:22.139 ****** 2025-10-02 11:29:25,153 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:25,167 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:29:25,167 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.110) 0:02:22.249 ****** 2025-10-02 11:29:25,305 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,318 p=28172 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-10-02 11:29:25,318 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.150) 0:02:22.400 ****** 2025-10-02 11:29:25,342 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:25,356 p=28172 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-10-02 11:29:25,357 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.038) 0:02:22.438 ****** 2025-10-02 11:29:25,373 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:25,396 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:25,396 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.039) 0:02:22.478 ****** 2025-10-02 11:29:25,459 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,468 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:25,468 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.071) 0:02:22.550 ****** 2025-10-02 11:29:25,561 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,572 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:25,572 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.104) 0:02:22.654 ****** 2025-10-02 11:29:25,664 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:25,685 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:25,686 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.113) 0:02:22.768 ****** 2025-10-02 11:29:25,739 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,747 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:25,747 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.061) 0:02:22.829 ****** 2025-10-02 11:29:25,840 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:25,857 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:25,857 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.110) 0:02:22.939 ****** 2025-10-02 11:29:25,951 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:25,965 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:29:25,965 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:25 +0000 (0:00:00.107) 0:02:23.047 ****** 2025-10-02 11:29:26,007 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,016 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-10-02 11:29:26,016 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.051) 0:02:23.098 ****** 2025-10-02 11:29:26,031 p=28172 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-10-02 11:29:26,038 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:26,038 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.022) 0:02:23.120 ****** 2025-10-02 11:29:26,089 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,102 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:26,102 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.064) 0:02:23.184 ****** 2025-10-02 11:29:26,195 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,204 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:26,204 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.101) 0:02:23.286 ****** 2025-10-02 11:29:26,296 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,315 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:26,315 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.111) 0:02:23.397 ****** 2025-10-02 11:29:26,368 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,377 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:26,377 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.061) 0:02:23.459 ****** 2025-10-02 11:29:26,475 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,484 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:26,484 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.107) 0:02:23.566 ****** 2025-10-02 11:29:26,579 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,594 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:29:26,594 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.110) 0:02:23.676 ****** 2025-10-02 11:29:26,634 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:26,644 p=28172 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 11:29:26,644 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.049) 0:02:23.726 ****** 2025-10-02 11:29:26,675 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-10-02 11:29:26,681 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-10-02 11:29:26,683 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,693 p=28172 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-10-02 11:29:26,693 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.048) 0:02:23.775 ****** 2025-10-02 11:29:26,720 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,729 p=28172 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-10-02 11:29:26,730 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.036) 0:02:23.812 ****** 2025-10-02 11:29:26,756 p=28172 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2025-10-02 11:29:26,758 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,768 p=28172 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-10-02 11:29:26,769 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.038) 0:02:23.851 ****** 2025-10-02 11:29:26,793 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,801 p=28172 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-10-02 11:29:26,801 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.032) 0:02:23.883 ****** 2025-10-02 11:29:26,826 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,835 p=28172 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-10-02 11:29:26,835 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.033) 0:02:23.917 ****** 2025-10-02 11:29:26,860 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,868 p=28172 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-10-02 11:29:26,868 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.033) 0:02:23.950 ****** 2025-10-02 11:29:26,892 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,902 p=28172 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-10-02 11:29:26,902 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.033) 0:02:23.984 ****** 2025-10-02 11:29:26,926 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,934 p=28172 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-10-02 11:29:26,934 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.032) 0:02:24.016 ****** 2025-10-02 11:29:26,958 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:26,967 p=28172 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-10-02 11:29:26,968 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:26 +0000 (0:00:00.033) 0:02:24.050 ****** 2025-10-02 11:29:26,990 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:27,006 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:27,006 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.038) 0:02:24.088 ****** 2025-10-02 11:29:27,059 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,067 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:27,067 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.061) 0:02:24.149 ****** 2025-10-02 11:29:27,163 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,173 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:27,173 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.105) 0:02:24.255 ****** 2025-10-02 11:29:27,269 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:27,289 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:29:27,289 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.116) 0:02:24.371 ****** 2025-10-02 11:29:27,347 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,355 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:29:27,355 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.066) 0:02:24.437 ****** 2025-10-02 11:29:27,453 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,463 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:29:27,463 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.107) 0:02:24.545 ****** 2025-10-02 11:29:27,604 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2025-10-02 11:29:27,614 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2025-10-02 11:29:27,625 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Kustomize OpenStack CR cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 11:29:27,625 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.162) 0:02:24.707 ****** 2025-10-02 11:29:27,679 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,687 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 11:29:27,687 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.062) 0:02:24.769 ****** 2025-10-02 11:29:27,890 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:27,901 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 11:29:27,901 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.213) 0:02:24.983 ****** 2025-10-02 11:29:27,923 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:27,932 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 11:29:27,932 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:27 +0000 (0:00:00.030) 0:02:25.014 ****** 2025-10-02 11:29:28,145 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:28,156 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 11:29:28,156 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:28 +0000 (0:00:00.223) 0:02:25.238 ****** 2025-10-02 11:29:28,183 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:28,192 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 11:29:28,192 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:28 +0000 (0:00:00.036) 0:02:25.274 ****** 2025-10-02 11:29:28,381 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:28,393 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:29:28,393 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:28 +0000 (0:00:00.201) 0:02:25.475 ****** 2025-10-02 11:29:28,602 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:28,623 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Kustomize OpenStack CR] *********** 2025-10-02 11:29:28,623 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:28 +0000 (0:00:00.229) 0:02:25.705 ****** 2025-10-02 11:29:28,674 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log 2025-10-02 11:29:30,517 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:29:30,529 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Kustomize OpenStack CR] ************** 2025-10-02 11:29:30,529 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:30 +0000 (0:00:01.906) 0:02:27.611 ****** 2025-10-02 11:29:30,556 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:30,565 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:29:30,565 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:30 +0000 (0:00:00.035) 0:02:27.647 ****** 2025-10-02 11:29:30,756 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:30,765 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:29:30,765 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:30 +0000 (0:00:00.199) 0:02:27.847 ****** 2025-10-02 11:29:30,785 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:30,795 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Create coo subscription cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 11:29:30,795 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:30 +0000 (0:00:00.029) 0:02:27.877 ****** 2025-10-02 11:29:30,846 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:30,856 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 11:29:30,856 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:30 +0000 (0:00:00.060) 0:02:27.938 ****** 2025-10-02 11:29:31,075 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:31,084 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 11:29:31,084 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.228) 0:02:28.166 ****** 2025-10-02 11:29:31,120 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:29:31,129 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 11:29:31,129 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.045) 0:02:28.211 ****** 2025-10-02 11:29:31,340 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:31,349 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 11:29:31,349 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.219) 0:02:28.431 ****** 2025-10-02 11:29:31,371 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:31,379 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 11:29:31,380 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.030) 0:02:28.462 ****** 2025-10-02 11:29:31,590 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:31,599 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:29:31,599 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.219) 0:02:28.681 ****** 2025-10-02 11:29:31,811 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:29:31,821 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Create coo subscription] ************* 2025-10-02 11:29:31,821 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:29:31 +0000 (0:00:00.222) 0:02:28.903 ****** 2025-10-02 11:29:31,881 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_create.log 2025-10-02 11:30:28,532 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:28,545 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Create coo subscription] **************** 2025-10-02 11:30:28,545 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:28 +0000 (0:00:56.723) 0:03:25.627 ****** 2025-10-02 11:30:28,574 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:28,587 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:30:28,587 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:28 +0000 (0:00:00.041) 0:03:25.669 ****** 2025-10-02 11:30:28,772 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:28,781 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:30:28,782 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:28 +0000 (0:00:00.194) 0:03:25.864 ****** 2025-10-02 11:30:28,802 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:28,820 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:30:28,820 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:28 +0000 (0:00:00.038) 0:03:25.902 ****** 2025-10-02 11:30:28,880 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:28,889 p=28172 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-10-02 11:30:28,889 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:28 +0000 (0:00:00.068) 0:03:25.971 ****** 2025-10-02 11:30:29,003 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 11:30:29,003 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:29 +0000 (0:00:00.114) 0:03:26.085 ****** 2025-10-02 11:30:29,232 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:29,243 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-10-02 11:30:29,243 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:29 +0000 (0:00:00.239) 0:03:26.325 ****** 2025-10-02 11:30:30,027 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:30,035 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-10-02 11:30:30,035 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:30 +0000 (0:00:00.792) 0:03:27.117 ****** 2025-10-02 11:30:30,440 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:30,448 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-10-02 11:30:30,448 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:30 +0000 (0:00:00.412) 0:03:27.530 ****** 2025-10-02 11:30:31,272 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:31,283 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-10-02 11:30:31,283 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:31 +0000 (0:00:00.834) 0:03:28.365 ****** 2025-10-02 11:30:31,530 p=28172 u=zuul n=ansible | changed: [localhost -> compute-0(38.102.83.156)] => (item=compute-0) 2025-10-02 11:30:31,779 p=28172 u=zuul n=ansible | changed: [localhost -> compute-1(38.102.83.115)] => (item=compute-1) 2025-10-02 11:30:32,867 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=crc) 2025-10-02 11:30:33,209 p=28172 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.234)] => (item=controller) 2025-10-02 11:30:33,400 p=28172 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-10-02 11:30:33,402 p=28172 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-10-02 11:30:33,410 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-10-02 11:30:33,410 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:33 +0000 (0:00:02.127) 0:03:30.492 ****** 2025-10-02 11:30:33,453 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:33,462 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-10-02 11:30:33,462 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:33 +0000 (0:00:00.051) 0:03:30.544 ****** 2025-10-02 11:30:34,400 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:34,409 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-10-02 11:30:34,409 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:34 +0000 (0:00:00.947) 0:03:31.491 ****** 2025-10-02 11:30:34,446 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-10-02 11:30:34,461 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-10-02 11:30:34,462 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:34 +0000 (0:00:00.052) 0:03:31.544 ****** 2025-10-02 11:30:35,001 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=1) 2025-10-02 11:30:35,468 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=2) 2025-10-02 11:30:35,904 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=3) 2025-10-02 11:30:36,339 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=4) 2025-10-02 11:30:36,748 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=5) 2025-10-02 11:30:37,192 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=6) 2025-10-02 11:30:37,635 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=7) 2025-10-02 11:30:38,099 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=8) 2025-10-02 11:30:38,555 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=9) 2025-10-02 11:30:38,983 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=10) 2025-10-02 11:30:39,403 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=11) 2025-10-02 11:30:39,829 p=28172 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.32)] => (item=12) 2025-10-02 11:30:39,851 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-10-02 11:30:39,852 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:39 +0000 (0:00:05.390) 0:03:36.934 ****** 2025-10-02 11:30:40,439 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:40,447 p=28172 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-10-02 11:30:40,447 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:40 +0000 (0:00:00.595) 0:03:37.529 ****** 2025-10-02 11:30:41,687 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:41,705 p=28172 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-10-02 11:30:41,705 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:41 +0000 (0:00:01.258) 0:03:38.787 ****** 2025-10-02 11:30:41,734 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:41,744 p=28172 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-10-02 11:30:41,745 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:41 +0000 (0:00:00.039) 0:03:38.827 ****** 2025-10-02 11:30:41,877 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-10-02 11:30:41,877 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:41 +0000 (0:00:00.132) 0:03:38.959 ****** 2025-10-02 11:30:41,919 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:41,931 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-10-02 11:30:41,931 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:41 +0000 (0:00:00.053) 0:03:39.013 ****** 2025-10-02 11:30:41,969 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:30:41,977 p=28172 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-10-02 11:30:41,978 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:41 +0000 (0:00:00.046) 0:03:39.060 ****** 2025-10-02 11:30:42,009 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:42,020 p=28172 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-10-02 11:30:42,020 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:42 +0000 (0:00:00.042) 0:03:39.102 ****** 2025-10-02 11:30:42,089 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-10-02 11:30:42,089 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:42 +0000 (0:00:00.068) 0:03:39.171 ****** 2025-10-02 11:30:42,121 p=28172 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:30:42,129 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-10-02 11:30:42,130 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:42 +0000 (0:00:00.040) 0:03:39.212 ****** 2025-10-02 11:30:42,156 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:42,164 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-10-02 11:30:42,165 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:42 +0000 (0:00:00.034) 0:03:39.247 ****** 2025-10-02 11:30:42,221 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2025-10-02 11:30:43,884 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-10-02 11:30:43,886 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:30:43,902 p=28172 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-10-02 11:30:43,903 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:43 +0000 (0:00:01.738) 0:03:40.985 ****** 2025-10-02 11:30:43,962 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-10-02 11:30:43,962 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:43 +0000 (0:00:00.059) 0:03:41.044 ****** 2025-10-02 11:30:43,990 p=28172 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_IMG: 38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:30:43,999 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-10-02 11:30:43,999 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:43 +0000 (0:00:00.037) 0:03:41.081 ****** 2025-10-02 11:30:44,020 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:30:44,030 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-10-02 11:30:44,030 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:30:44 +0000 (0:00:00.030) 0:03:41.112 ****** 2025-10-02 11:30:44,091 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run.log 2025-10-02 11:32:53,449 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-10-02 11:32:53,452 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:32:53,471 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-10-02 11:32:53,471 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:32:53 +0000 (0:02:09.440) 0:05:50.553 ****** 2025-10-02 11:33:24,275 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:33:24,286 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-10-02 11:33:24,286 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:24 +0000 (0:00:30.815) 0:06:21.368 ****** 2025-10-02 11:33:25,436 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:33:25,446 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-10-02 11:33:25,446 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:25 +0000 (0:00:01.159) 0:06:22.528 ****** 2025-10-02 11:33:26,490 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:33:26,502 p=28172 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-10-02 11:33:26,503 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:26 +0000 (0:00:01.056) 0:06:23.585 ****** 2025-10-02 11:33:26,574 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-10-02 11:33:26,575 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:26 +0000 (0:00:00.071) 0:06:23.657 ****** 2025-10-02 11:33:26,601 p=28172 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:33:26,612 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-10-02 11:33:26,612 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:26 +0000 (0:00:00.037) 0:06:23.694 ****** 2025-10-02 11:33:26,634 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:33:26,643 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-10-02 11:33:26,643 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:33:26 +0000 (0:00:00.030) 0:06:23.725 ****** 2025-10-02 11:33:26,695 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log 2025-10-02 11:34:22,716 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-10-02 11:34:22,717 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:22,735 p=28172 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-10-02 11:34:22,735 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:56.092) 0:07:19.817 ****** 2025-10-02 11:34:22,763 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:34:22,771 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-10-02 11:34:22,772 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:00.036) 0:07:19.854 ****** 2025-10-02 11:34:22,800 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:34:22,809 p=28172 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-10-02 11:34:22,809 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:00.037) 0:07:19.891 ****** 2025-10-02 11:34:22,863 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-10-02 11:34:22,864 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:00.054) 0:07:19.946 ****** 2025-10-02 11:34:22,895 p=28172 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:34:22,903 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-10-02 11:34:22,903 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:00.039) 0:07:19.985 ****** 2025-10-02 11:34:22,924 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:34:22,933 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-10-02 11:34:22,933 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:22 +0000 (0:00:00.029) 0:07:20.015 ****** 2025-10-02 11:34:22,982 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log 2025-10-02 11:34:24,267 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-10-02 11:34:24,269 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:24,283 p=28172 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-10-02 11:34:24,284 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:24 +0000 (0:00:01.350) 0:07:21.366 ****** 2025-10-02 11:34:24,340 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-10-02 11:34:24,340 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:24 +0000 (0:00:00.056) 0:07:21.422 ****** 2025-10-02 11:34:24,378 p=28172 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:34:24,389 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-10-02 11:34:24,389 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:24 +0000 (0:00:00.048) 0:07:21.471 ****** 2025-10-02 11:34:24,413 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:34:24,422 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-10-02 11:34:24,422 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:24 +0000 (0:00:00.033) 0:07:21.504 ****** 2025-10-02 11:34:24,472 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log 2025-10-02 11:34:29,860 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-10-02 11:34:29,862 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:29,878 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2025-10-02 11:34:29,878 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:29 +0000 (0:00:05.455) 0:07:26.960 ****** 2025-10-02 11:34:29,915 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2025-10-02 11:34:29,941 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2025-10-02 11:34:29,942 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:29 +0000 (0:00:00.063) 0:07:27.024 ****** 2025-10-02 11:34:29,967 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:34:29,976 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2025-10-02 11:34:29,976 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:29 +0000 (0:00:00.034) 0:07:27.058 ****** 2025-10-02 11:34:30,012 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:34:30,022 p=28172 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2025-10-02 11:34:30,022 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:30 +0000 (0:00:00.045) 0:07:27.104 ****** 2025-10-02 11:34:30,080 p=28172 u=zuul n=ansible | TASK [update_containers : Destination directory exists state=directory, recurse=True, path={{ cifmw_update_containers_dest_path | dirname }}] *** 2025-10-02 11:34:30,080 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:30 +0000 (0:00:00.058) 0:07:27.162 ****** 2025-10-02 11:34:31,182 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:34:31,193 p=28172 u=zuul n=ansible | TASK [update_containers : Generate update containers yaml file src=update_containers.j2, dest={{ cifmw_update_containers_dest_path }}, mode=0644] *** 2025-10-02 11:34:31,193 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:31 +0000 (0:00:01.112) 0:07:28.275 ****** 2025-10-02 11:34:31,708 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:31,722 p=28172 u=zuul n=ansible | TASK [update_containers : Update the containers _raw_params=oc apply -f {{ cifmw_update_containers_dest_path }}] *** 2025-10-02 11:34:31,722 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:31 +0000 (0:00:00.529) 0:07:28.804 ****** 2025-10-02 11:34:32,127 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:32,147 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2025-10-02 11:34:32,147 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:32 +0000 (0:00:00.424) 0:07:29.229 ****** 2025-10-02 11:34:32,176 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:34:32,195 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 11:34:32,195 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:32 +0000 (0:00:00.048) 0:07:29.277 ****** 2025-10-02 11:34:33,388 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:33,399 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2025-10-02 11:34:33,400 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:33 +0000 (0:00:01.204) 0:07:30.481 ****** 2025-10-02 11:34:33,445 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: osp-secret cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: osp-secret designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: osp-secret dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: osp-secret storageRequest: 10G openstack-cell1: replicas: 1 secret: osp-secret storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: osp-secret storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: osp-secret horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: osp-secret ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: osp-secret keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: osp-secret ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: osp-secret storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: osp-secret enabled: false heatInstance: heat ceilometer: enabled: true secret: osp-secret logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: customMonitoringStack: alertmanagerConfig: disabled: true prometheusConfig: enableRemoteWriteReceiver: true persistentVolumeClaim: resources: requests: storage: 20G replicas: 1 scrapeInterval: 30s resourceSelector: matchLabels: service: metricStorage retention: 24h enabled: true watcher: enabled: true template: decisionengineServiceTemplate: customServiceConfig: |- [watcher_cluster_data_model_collectors.compute] period = 60 [watcher_cluster_data_model_collectors.storage] period = 60 2025-10-02 11:34:33,456 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2025-10-02 11:34:33,456 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:33 +0000 (0:00:00.056) 0:07:30.538 ****** 2025-10-02 11:34:33,529 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2025-10-02 11:34:33,862 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:34:33,871 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2025-10-02 11:34:33,871 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:34:33 +0000 (0:00:00.414) 0:07:30.953 ****** 2025-10-02 11:34:33,893 p=28172 u=zuul n=ansible | Pausing for 30 seconds 2025-10-02 11:35:03,917 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:35:03,928 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2025-10-02 11:35:03,928 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:35:03 +0000 (0:00:30.056) 0:08:01.010 ****** 2025-10-02 11:40:22,697 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:22,708 p=28172 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2025-10-02 11:40:22,708 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:22 +0000 (0:05:18.779) 0:13:19.790 ****** 2025-10-02 11:40:22,795 p=28172 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2025-10-02 11:40:22,796 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:22 +0000 (0:00:00.087) 0:13:19.878 ****** 2025-10-02 11:40:23,212 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:23,220 p=28172 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2025-10-02 11:40:23,220 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:23 +0000 (0:00:00.424) 0:13:20.302 ****** 2025-10-02 11:40:23,252 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:23,261 p=28172 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2025-10-02 11:40:23,261 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:23 +0000 (0:00:00.041) 0:13:20.343 ****** 2025-10-02 11:40:23,695 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:23,706 p=28172 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-10-02 11:40:23,706 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:23 +0000 (0:00:00.445) 0:13:20.788 ****** 2025-10-02 11:40:23,995 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:24,002 p=28172 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2025-10-02 11:40:24,002 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.295) 0:13:21.084 ****** 2025-10-02 11:40:24,059 p=28172 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-10-02 11:40:24,059 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.057) 0:13:21.141 ****** 2025-10-02 11:40:24,282 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:24,291 p=28172 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-10-02 11:40:24,291 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.231) 0:13:21.373 ****** 2025-10-02 11:40:24,313 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:24,321 p=28172 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-10-02 11:40:24,322 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.030) 0:13:21.404 ****** 2025-10-02 11:40:24,344 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:24,353 p=28172 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-10-02 11:40:24,353 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.031) 0:13:21.435 ****** 2025-10-02 11:40:24,841 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:24,849 p=28172 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-10-02 11:40:24,850 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:24 +0000 (0:00:00.496) 0:13:21.932 ****** 2025-10-02 11:40:26,546 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:26,572 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2025-10-02 11:40:26,572 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:26 +0000 (0:00:01.722) 0:13:23.654 ****** 2025-10-02 11:40:26,948 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:26,958 p=28172 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2025-10-02 11:40:26,958 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:26 +0000 (0:00:00.386) 0:13:24.040 ****** 2025-10-02 11:40:27,475 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:27,491 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 11:40:27,491 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:27 +0000 (0:00:00.533) 0:13:24.573 ****** 2025-10-02 11:40:27,548 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:27,558 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 11:40:27,558 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:27 +0000 (0:00:00.066) 0:13:24.640 ****** 2025-10-02 11:40:27,667 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:27,678 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 11:40:27,678 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:27 +0000 (0:00:00.120) 0:13:24.760 ****** 2025-10-02 11:40:27,819 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}) 2025-10-02 11:40:27,832 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Tune rabbitmq resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 11:40:27,832 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:27 +0000 (0:00:00.154) 0:13:24.914 ****** 2025-10-02 11:40:27,892 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:27,901 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 11:40:27,901 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:27 +0000 (0:00:00.068) 0:13:24.983 ****** 2025-10-02 11:40:28,137 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:28,146 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 11:40:28,147 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.245) 0:13:25.229 ****** 2025-10-02 11:40:28,171 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:28,180 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 11:40:28,181 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.033) 0:13:25.263 ****** 2025-10-02 11:40:28,378 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:28,390 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 11:40:28,390 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.209) 0:13:25.472 ****** 2025-10-02 11:40:28,425 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:28,436 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 11:40:28,437 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.046) 0:13:25.519 ****** 2025-10-02 11:40:28,681 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:28,690 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 11:40:28,690 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.253) 0:13:25.772 ****** 2025-10-02 11:40:28,944 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:28,953 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Tune rabbitmq resources] ************* 2025-10-02 11:40:28,953 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:28 +0000 (0:00:00.263) 0:13:26.035 ****** 2025-10-02 11:40:29,009 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log 2025-10-02 11:40:31,712 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:31,722 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Tune rabbitmq resources] **************** 2025-10-02 11:40:31,722 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:31 +0000 (0:00:02.768) 0:13:28.804 ****** 2025-10-02 11:40:31,751 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:31,767 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:40:31,767 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:31 +0000 (0:00:00.045) 0:13:28.849 ****** 2025-10-02 11:40:31,954 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:31,963 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 11:40:31,963 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:31 +0000 (0:00:00.195) 0:13:29.045 ****** 2025-10-02 11:40:31,989 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,003 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:40:32,003 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.039) 0:13:29.085 ****** 2025-10-02 11:40:32,058 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:32,068 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2025-10-02 11:40:32,068 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.065) 0:13:29.150 ****** 2025-10-02 11:40:32,094 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,104 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2025-10-02 11:40:32,104 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.035) 0:13:29.186 ****** 2025-10-02 11:40:32,129 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,137 p=28172 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2025-10-02 11:40:32,137 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.219 ****** 2025-10-02 11:40:32,162 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,171 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2025-10-02 11:40:32,171 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.034) 0:13:29.253 ****** 2025-10-02 11:40:32,196 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,205 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2025-10-02 11:40:32,205 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.287 ****** 2025-10-02 11:40:32,230 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,239 p=28172 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2025-10-02 11:40:32,239 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.321 ****** 2025-10-02 11:40:32,270 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,279 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 11:40:32,279 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.039) 0:13:29.361 ****** 2025-10-02 11:40:32,304 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,314 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2025-10-02 11:40:32,314 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.035) 0:13:29.396 ****** 2025-10-02 11:40:32,338 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,347 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2025-10-02 11:40:32,348 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.430 ****** 2025-10-02 11:40:32,371 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,381 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 11:40:32,381 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.463 ****** 2025-10-02 11:40:32,406 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,414 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 11:40:32,414 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.496 ****** 2025-10-02 11:40:32,439 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,447 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 11:40:32,448 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.530 ****** 2025-10-02 11:40:32,472 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,482 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 11:40:32,482 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.034) 0:13:29.564 ****** 2025-10-02 11:40:32,506 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,515 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2025-10-02 11:40:32,515 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.032) 0:13:29.597 ****** 2025-10-02 11:40:32,539 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,547 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2025-10-02 11:40:32,547 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.032) 0:13:29.629 ****** 2025-10-02 11:40:32,572 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,580 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2025-10-02 11:40:32,581 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.663 ****** 2025-10-02 11:40:32,606 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,614 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2025-10-02 11:40:32,614 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.696 ****** 2025-10-02 11:40:32,636 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,647 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2025-10-02 11:40:32,647 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.032) 0:13:29.729 ****** 2025-10-02 11:40:32,671 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,680 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2025-10-02 11:40:32,680 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.762 ****** 2025-10-02 11:40:32,704 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,712 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2025-10-02 11:40:32,712 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.032) 0:13:29.794 ****** 2025-10-02 11:40:32,736 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,746 p=28172 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-10-02 11:40:32,746 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.033) 0:13:29.828 ****** 2025-10-02 11:40:32,769 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,783 p=28172 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 11:40:32,784 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.037) 0:13:29.866 ****** 2025-10-02 11:40:32,839 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:32,848 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2025-10-02 11:40:32,848 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.064) 0:13:29.930 ****** 2025-10-02 11:40:32,873 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,883 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2025-10-02 11:40:32,883 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.034) 0:13:29.965 ****** 2025-10-02 11:40:32,922 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2025-10-02 11:40:32,939 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2025-10-02 11:40:32,952 p=28172 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2025-10-02 11:40:32,953 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:32,964 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2025-10-02 11:40:32,964 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:32 +0000 (0:00:00.081) 0:13:30.046 ****** 2025-10-02 11:40:32,993 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,004 p=28172 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2025-10-02 11:40:33,004 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.039) 0:13:30.086 ****** 2025-10-02 11:40:33,040 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,049 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2025-10-02 11:40:33,050 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.045) 0:13:30.131 ****** 2025-10-02 11:40:33,077 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,087 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2025-10-02 11:40:33,087 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.037) 0:13:30.169 ****** 2025-10-02 11:40:33,114 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,124 p=28172 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2025-10-02 11:40:33,124 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.037) 0:13:30.206 ****** 2025-10-02 11:40:33,153 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,167 p=28172 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2025-10-02 11:40:33,167 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.043) 0:13:30.249 ****** 2025-10-02 11:40:33,193 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,203 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-10-02 11:40:33,203 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.035) 0:13:30.285 ****** 2025-10-02 11:40:33,248 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:33,259 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-10-02 11:40:33,259 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.055) 0:13:30.341 ****** 2025-10-02 11:40:33,685 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:33,694 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-10-02 11:40:33,694 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.435) 0:13:30.776 ****** 2025-10-02 11:40:33,731 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 11:40:33,740 p=28172 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-10-02 11:40:33,740 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.045) 0:13:30.822 ****** 2025-10-02 11:40:33,789 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2025-10-02 11:40:33,789 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.049) 0:13:30.871 ****** 2025-10-02 11:40:33,821 p=28172 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: a0eac564d779a7eaac46c9816bff261a DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 2 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2025-10-02 11:40:33,831 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2025-10-02 11:40:33,831 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.041) 0:13:30.913 ****** 2025-10-02 11:40:33,857 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 11:40:33,866 p=28172 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2025-10-02 11:40:33,866 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:33 +0000 (0:00:00.034) 0:13:30.948 ****** 2025-10-02 11:40:33,924 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log 2025-10-02 11:40:43,839 p=28172 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2025-10-02 11:40:43,841 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:43,857 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 11:40:43,857 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:43 +0000 (0:00:09.991) 0:13:40.939 ****** 2025-10-02 11:40:44,236 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:44,247 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-10-02 11:40:44,247 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:44 +0000 (0:00:00.390) 0:13:41.329 ****** 2025-10-02 11:40:44,294 p=28172 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 199.204.44.24 edpm_container_registry_insecure_registries: - 38.129.56.134:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter enable_debug: false gather_facts: false image_prefix: openstack image_tag: a0eac564d779a7eaac46c9816bff261a neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2025-10-02 11:40:44,302 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-10-02 11:40:44,303 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:44 +0000 (0:00:00.055) 0:13:41.385 ****** 2025-10-02 11:40:45,399 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:45,410 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-10-02 11:40:45,410 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:45 +0000 (0:00:01.107) 0:13:42.492 ****** 2025-10-02 11:40:46,364 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:46,376 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-10-02 11:40:46,376 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:46 +0000 (0:00:00.966) 0:13:43.458 ****** 2025-10-02 11:40:47,194 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 11:40:47,206 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-10-02 11:40:47,206 p=28172 u=zuul n=ansible | Thursday 02 October 2025 11:40:47 +0000 (0:00:00.829) 0:13:44.288 ****** 2025-10-02 12:05:19,997 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:05:20,008 p=28172 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2025-10-02 12:05:20,009 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:20 +0000 (0:24:32.802) 0:38:17.091 ****** 2025-10-02 12:05:20,075 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_run_nova_manage_discover.log 2025-10-02 12:05:23,163 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:05:23,172 p=28172 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2025-10-02 12:05:23,172 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:03.163) 0:38:20.254 ****** 2025-10-02 12:05:23,197 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:23,240 p=28172 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2025-10-02 12:05:23,259 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 12:05:23,260 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.087) 0:38:20.342 ****** 2025-10-02 12:05:23,274 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,282 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Install required packages name=['nfs-utils', 'iptables']] **** 2025-10-02 12:05:23,282 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.022) 0:38:20.364 ****** 2025-10-02 12:05:23,297 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,305 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Configure nfs to use v4 only path=/etc/nfs.conf, section=nfsd, option=vers3, value=n, backup=True, mode=0644] *** 2025-10-02 12:05:23,305 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.022) 0:38:20.387 ****** 2025-10-02 12:05:23,321 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,329 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Disable NFSv3-related services name={{ item }}, masked=True] *** 2025-10-02 12:05:23,329 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.023) 0:38:20.411 ****** 2025-10-02 12:05:23,346 p=28172 u=zuul n=ansible | skipping: [compute-0] => (item=rpc-statd.service) 2025-10-02 12:05:23,351 p=28172 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.service) 2025-10-02 12:05:23,354 p=28172 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.socket) 2025-10-02 12:05:23,354 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,362 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Ensure shared folder exist path=/data/{{ item }}, state=directory, mode=755] *** 2025-10-02 12:05:23,362 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.033) 0:38:20.444 ****** 2025-10-02 12:05:23,382 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,392 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Set nfs network vars _raw_params=oc get ipset {{ _nfs_host }} -n {{ _ipset_namespace }} -o jsonpath='{.status.reservations[?(@.network=="{{ _nfs_network_name }}")]}'] *** 2025-10-02 12:05:23,392 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.030) 0:38:20.474 ****** 2025-10-02 12:05:23,413 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,422 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Store nfs network vars dest={{ cifmw_basedir }}/artifacts/parameters/nfs-params.yml, content={{ { 'cifmw_nfs_ip': cifmw_nfs_network_out.stdout | from_json | json_query('address'), 'cifmw_nfs_network_range': cifmw_nfs_network_out.stdout | from_json | json_query('cidr') } | to_nice_yaml }}, mode=0644] *** 2025-10-02 12:05:23,422 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.029) 0:38:20.504 ****** 2025-10-02 12:05:23,445 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,454 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Generate nftables rules file content=add rule inet filter EDPM_INPUT tcp dport 2049 accept , dest={{ nftables_path }}/nfs-server.nft, mode=0666] *** 2025-10-02 12:05:23,454 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.031) 0:38:20.536 ****** 2025-10-02 12:05:23,471 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,479 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Update nftables.conf and include nfs rules at the bottom path={{ nftables_conf }}, line=include "{{ nftables_path }}/nfs-server.nft", insertafter=EOF] *** 2025-10-02 12:05:23,479 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.025) 0:38:20.561 ****** 2025-10-02 12:05:23,496 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,505 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Restart nftables service name=nftables, state=restarted] ***** 2025-10-02 12:05:23,505 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.026) 0:38:20.587 ****** 2025-10-02 12:05:23,522 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,531 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Configure the ip the nfs server should listen on path=/etc/nfs.conf, section=nfsd, option=host, value={{ cifmw_nfs_network_out.stdout | from_json | json_query('address') }}, backup=True, mode=0644] *** 2025-10-02 12:05:23,531 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.025) 0:38:20.613 ****** 2025-10-02 12:05:23,547 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,555 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Enable and restart nfs-server service name=nfs-server, state=restarted, enabled=True] *** 2025-10-02 12:05:23,556 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.024) 0:38:20.638 ****** 2025-10-02 12:05:23,572 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,580 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Add shares to /etc/exports path=/etc/exports, line=/data/{{ item }} {{ cifmw_nfs_network_out.stdout | from_json | json_query('cidr') }}(rw,sync,no_root_squash)] *** 2025-10-02 12:05:23,580 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.024) 0:38:20.662 ****** 2025-10-02 12:05:23,598 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,606 p=28172 u=zuul n=ansible | TASK [cifmw_nfs : Export the shares _raw_params=exportfs -a] ******************* 2025-10-02 12:05:23,606 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.026) 0:38:20.688 ****** 2025-10-02 12:05:23,623 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,660 p=28172 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2025-10-02 12:05:23,690 p=28172 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-10-02 12:05:23,690 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.083) 0:38:20.772 ****** 2025-10-02 12:05:23,700 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,706 p=28172 u=zuul n=ansible | TASK [Clear ceph target hosts facts _raw_params=clear_facts] ******************* 2025-10-02 12:05:23,706 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.015) 0:38:20.788 ****** 2025-10-02 12:05:23,716 p=28172 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:05:23,760 p=28172 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2025-10-02 12:05:23,778 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:05:23,779 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.072) 0:38:20.861 ****** 2025-10-02 12:05:23,826 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:23,833 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:05:23,834 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:23 +0000 (0:00:00.055) 0:38:20.916 ****** 2025-10-02 12:05:23,997 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:24,006 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:05:24,006 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.172) 0:38:21.088 ****** 2025-10-02 12:05:24,172 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:24,220 p=28172 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2025-10-02 12:05:24,256 p=28172 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2025-10-02 12:05:24,256 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.249) 0:38:21.338 ****** 2025-10-02 12:05:24,278 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:24,287 p=28172 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2025-10-02 12:05:24,287 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.031) 0:38:21.369 ****** 2025-10-02 12:05:24,308 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:24,317 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:05:24,317 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.029) 0:38:21.399 ****** 2025-10-02 12:05:24,376 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:24,385 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:05:24,385 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.067) 0:38:21.467 ****** 2025-10-02 12:05:24,551 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:24,561 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:05:24,561 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.176) 0:38:21.643 ****** 2025-10-02 12:05:24,694 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-10-02 12:05:24,703 p=28172 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}) 2025-10-02 12:05:24,714 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 12:05:24,714 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.153) 0:38:21.796 ****** 2025-10-02 12:05:24,760 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:24,768 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 12:05:24,769 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.054) 0:38:21.851 ****** 2025-10-02 12:05:24,987 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:24,998 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 12:05:24,998 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:24 +0000 (0:00:00.229) 0:38:22.080 ****** 2025-10-02 12:05:25,018 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:25,030 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 12:05:25,030 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:25 +0000 (0:00:00.032) 0:38:22.112 ****** 2025-10-02 12:05:25,242 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:25,250 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 12:05:25,250 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:25 +0000 (0:00:00.220) 0:38:22.332 ****** 2025-10-02 12:05:25,277 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:25,287 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 12:05:25,287 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:25 +0000 (0:00:00.036) 0:38:22.369 ****** 2025-10-02 12:05:25,482 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:25,490 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 12:05:25,490 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:25 +0000 (0:00:00.203) 0:38:22.572 ****** 2025-10-02 12:05:25,677 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:25,687 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-10-02 12:05:25,687 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:25 +0000 (0:00:00.196) 0:38:22.769 ****** 2025-10-02 12:05:25,741 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_run_hook_without_retry.log 2025-10-02 12:05:55,618 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:05:55,629 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-10-02 12:05:55,629 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:55 +0000 (0:00:29.942) 0:38:52.711 ****** 2025-10-02 12:05:55,652 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:55,662 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 12:05:55,662 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:55 +0000 (0:00:00.032) 0:38:52.744 ****** 2025-10-02 12:05:55,883 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:55,893 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 12:05:55,893 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:55 +0000 (0:00:00.231) 0:38:52.975 ****** 2025-10-02 12:05:55,913 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:55,925 p=28172 u=zuul n=ansible | TASK [run_hook : Set playbook path for Patch Openstack Prometheus to enable admin API cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 12:05:55,925 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:55 +0000 (0:00:00.032) 0:38:53.007 ****** 2025-10-02 12:05:55,969 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:55,979 p=28172 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 12:05:55,980 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:55 +0000 (0:00:00.054) 0:38:53.062 ****** 2025-10-02 12:05:56,274 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:56,285 p=28172 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 12:05:56,285 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:56 +0000 (0:00:00.305) 0:38:53.367 ****** 2025-10-02 12:05:56,307 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:56,316 p=28172 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 12:05:56,316 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:56 +0000 (0:00:00.030) 0:38:53.398 ****** 2025-10-02 12:05:56,536 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:56,545 p=28172 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 12:05:56,545 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:56 +0000 (0:00:00.229) 0:38:53.627 ****** 2025-10-02 12:05:56,574 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:56,584 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 12:05:56,584 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:56 +0000 (0:00:00.039) 0:38:53.666 ****** 2025-10-02 12:05:56,821 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:56,834 p=28172 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 12:05:56,834 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:56 +0000 (0:00:00.249) 0:38:53.916 ****** 2025-10-02 12:05:57,024 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:57,042 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Patch Openstack Prometheus to enable admin API] *** 2025-10-02 12:05:57,042 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:57 +0000 (0:00:00.207) 0:38:54.124 ****** 2025-10-02 12:05:57,103 p=28172 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_015_run_hook_without_retry_patch.log 2025-10-02 12:05:59,079 p=28172 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:05:59,089 p=28172 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Patch Openstack Prometheus to enable admin API] *** 2025-10-02 12:05:59,090 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:02.047) 0:38:56.172 ****** 2025-10-02 12:05:59,113 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,123 p=28172 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 12:05:59,124 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.033) 0:38:56.205 ****** 2025-10-02 12:05:59,323 p=28172 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:05:59,331 p=28172 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 12:05:59,331 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.207) 0:38:56.413 ****** 2025-10-02 12:05:59,351 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,368 p=28172 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2025-10-02 12:05:59,368 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.037) 0:38:56.450 ****** 2025-10-02 12:05:59,393 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,408 p=28172 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:05:59,409 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.040) 0:38:56.491 ****** 2025-10-02 12:05:59,429 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,438 p=28172 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:05:59,438 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.029) 0:38:56.520 ****** 2025-10-02 12:05:59,458 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,469 p=28172 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:05:59,469 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.030) 0:38:56.551 ****** 2025-10-02 12:05:59,598 p=28172 u=zuul n=ansible | skipping: [localhost] => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2025-10-02 12:05:59,603 p=28172 u=zuul n=ansible | skipping: [localhost] => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2025-10-02 12:05:59,604 p=28172 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:05:59,618 p=28172 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2025-10-02 12:05:59,619 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.149) 0:38:56.701 ****** 2025-10-02 12:05:59,629 p=28172 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-10-02 12:05:59,629 p=28172 u=zuul n=ansible | compute-0 : ok=0 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 2025-10-02 12:05:59,629 p=28172 u=zuul n=ansible | localhost : ok=243 changed=80 unreachable=0 failed=0 skipped=156 rescued=0 ignored=1 2025-10-02 12:05:59,629 p=28172 u=zuul n=ansible | Thursday 02 October 2025 12:05:59 +0000 (0:00:00.010) 0:38:56.711 ****** 2025-10-02 12:05:59,629 p=28172 u=zuul n=ansible | =============================================================================== 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ----- 1472.80s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 318.78s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 129.44s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | run_hook : Run hook without retry - Create coo subscription ------------ 56.72s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------- 56.09s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 35.13s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 30.82s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.06s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 29.94s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 28.45s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 12.32s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters -- 10.57s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_prep ------------------------------ 9.99s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 9.80s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 5.46s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 5.39s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.25s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped --- 3.16s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 3.11s 2025-10-02 12:05:59,630 p=28172 u=zuul n=ansible | run_hook : Run hook without retry - Tune rabbitmq resources ------------- 2.77s 2025-10-02 12:06:16,211 p=33391 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2025-10-02 12:06:16,262 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:06:16,262 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:16 +0000 (0:00:00.056) 0:00:00.056 ****** 2025-10-02 12:06:16,329 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:16,341 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:06:16,341 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:16 +0000 (0:00:00.079) 0:00:00.136 ****** 2025-10-02 12:06:16,448 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:16,461 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:06:16,461 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:16 +0000 (0:00:00.119) 0:00:00.256 ****** 2025-10-02 12:06:16,565 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:16,585 p=33391 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 12:06:16,585 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:16 +0000 (0:00:00.123) 0:00:00.379 ****** 2025-10-02 12:06:16,625 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:16,637 p=33391 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2025-10-02 12:06:16,638 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:16 +0000 (0:00:00.052) 0:00:00.432 ****** 2025-10-02 12:06:19,684 p=33391 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2025-10-02 12:06:19,697 p=33391 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2025-10-02 12:06:19,697 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:19 +0000 (0:00:03.059) 0:00:03.491 ****** 2025-10-02 12:06:22,321 p=33391 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2025-10-02 12:06:25,573 p=33391 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2025-10-02 12:06:25,583 p=33391 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2025-10-02 12:06:25,583 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:25 +0000 (0:00:05.886) 0:00:09.378 ****** 2025-10-02 12:06:28,625 p=33391 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2025-10-02 12:06:28,639 p=33391 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-10-02 12:06:28,639 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:28 +0000 (0:00:03.055) 0:00:12.433 ****** 2025-10-02 12:06:28,721 p=33391 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2025-10-02 12:06:28,731 p=33391 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-10-02 12:06:28,731 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:28 +0000 (0:00:00.092) 0:00:12.526 ****** 2025-10-02 12:06:34,703 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:34,714 p=33391 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-10-02 12:06:34,714 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:34 +0000 (0:00:05.982) 0:00:18.508 ****** 2025-10-02 12:06:34,833 p=33391 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2025-10-02 12:06:34,843 p=33391 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-10-02 12:06:34,843 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:34 +0000 (0:00:00.129) 0:00:18.638 ****** 2025-10-02 12:06:40,811 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:40,822 p=33391 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-10-02 12:06:40,822 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:40 +0000 (0:00:05.978) 0:00:24.616 ****** 2025-10-02 12:06:40,923 p=33391 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2025-10-02 12:06:40,963 p=33391 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-10-02 12:06:40,964 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:40 +0000 (0:00:00.141) 0:00:24.758 ****** 2025-10-02 12:06:46,602 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:46,622 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:06:46,623 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:46 +0000 (0:00:05.658) 0:00:30.417 ****** 2025-10-02 12:06:46,696 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:46,707 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:06:46,708 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:46 +0000 (0:00:00.085) 0:00:30.502 ****** 2025-10-02 12:06:46,800 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:46,813 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:06:46,813 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:46 +0000 (0:00:00.105) 0:00:30.608 ****** 2025-10-02 12:06:46,915 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:46,944 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:06:46,944 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:46 +0000 (0:00:00.130) 0:00:30.738 ****** 2025-10-02 12:06:47,037 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:47,047 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:06:47,047 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.103) 0:00:30.841 ****** 2025-10-02 12:06:47,173 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:47,183 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:06:47,183 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.136) 0:00:30.978 ****** 2025-10-02 12:06:47,275 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,297 p=33391 u=zuul n=ansible | TASK [test_operator : Cleanup previous test-operator resources _raw_params=cleanup.yaml] *** 2025-10-02 12:06:47,297 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.113) 0:00:31.092 ****** 2025-10-02 12:06:47,316 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,326 p=33391 u=zuul n=ansible | TASK [test_operator : Ensure test_operator folder exists path={{ cifmw_test_operator_artifacts_basedir }}, state=directory, mode=0755, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2025-10-02 12:06:47,326 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.029) 0:00:31.121 ****** 2025-10-02 12:06:47,617 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:47,629 p=33391 u=zuul n=ansible | TASK [test_operator : Get openstack-operator csv information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, label_selectors=['operators.coreos.com/openstack-operator.openstack-operators'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-10-02 12:06:47,629 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.302) 0:00:31.423 ****** 2025-10-02 12:06:47,656 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,670 p=33391 u=zuul n=ansible | TASK [test_operator : Get full name of openstack-operator CSV openstack_operator_csv_name={{ csv_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-10-02 12:06:47,671 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.041) 0:00:31.465 ****** 2025-10-02 12:06:47,694 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,705 p=33391 u=zuul n=ansible | TASK [test_operator : Get index of test-operator image _raw_params=set -o pipefail; oc get ClusterServiceVersion {{ openstack_operator_csv_name }} -o json | jq '.spec.install.spec.deployments[0].spec.template.spec.containers[0].env | to_entries[] | select(.value.name == "RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL").key'] *** 2025-10-02 12:06:47,705 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.034) 0:00:31.500 ****** 2025-10-02 12:06:47,729 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,740 p=33391 u=zuul n=ansible | TASK [test_operator : Patch test-operator version in CSV kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, namespace={{ cifmw_test_operator_controller_namespace }}, name={{ openstack_operator_csv_name }}, patch=[{'path': '/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/{{ image_index.stdout }}/value', 'value': '{{ cifmw_test_operator_bundle }}', 'op': 'replace'}]] *** 2025-10-02 12:06:47,740 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.034) 0:00:31.534 ****** 2025-10-02 12:06:47,764 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,776 p=33391 u=zuul n=ansible | TASK [test_operator : Get test-operator-controller-manager pod information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Pod, label_selectors=['control-plane=controller-manager', 'openstack.org/operator-name=test'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-10-02 12:06:47,776 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.036) 0:00:31.571 ****** 2025-10-02 12:06:47,803 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,814 p=33391 u=zuul n=ansible | TASK [test_operator : Get full name of test-operator-controller-manager pod test_operator_controller_name={{ pod_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-10-02 12:06:47,814 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.038) 0:00:31.609 ****** 2025-10-02 12:06:47,837 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,848 p=33391 u=zuul n=ansible | TASK [test_operator : Wait until the test-operator-controller-manager is reloaded kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ cifmw_test_operator_controller_namespace }}, kind=Pod] *** 2025-10-02 12:06:47,848 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.033) 0:00:31.642 ****** 2025-10-02 12:06:47,870 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,881 p=33391 u=zuul n=ansible | TASK [test_operator : Delete CRDs created by test-operator kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=CustomResourceDefinition, state=absent, api_version=v1, name={{ item }}, namespace={{ cifmw_test_operator_namespace }}, wait=True, wait_timeout=600] *** 2025-10-02 12:06:47,881 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.033) 0:00:31.676 ****** 2025-10-02 12:06:47,909 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=tempests.test.openstack.org) 2025-10-02 12:06:47,919 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=tobikoes.test.openstack.org) 2025-10-02 12:06:47,926 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=ansibletests.test.openstack.org) 2025-10-02 12:06:47,932 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=horizontests.test.openstack.org) 2025-10-02 12:06:47,933 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,944 p=33391 u=zuul n=ansible | TASK [test_operator : Clone test-operator repository and checkout into specified version repo=https://github.com/openstack-k8s-operators/test-operator.git, dest=/tmp/test-operator, refspec=+refs/pull/*:refs/heads/*, version={{ cifmw_test_operator_version }}, force=True] *** 2025-10-02 12:06:47,944 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.062) 0:00:31.738 ****** 2025-10-02 12:06:47,968 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:47,980 p=33391 u=zuul n=ansible | TASK [test_operator : Run make generate manifests install from /tmp/test-operator dir chdir=/tmp/test-operator, _raw_params=set -o pipefail; make generate manifests install] *** 2025-10-02 12:06:47,980 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:47 +0000 (0:00:00.036) 0:00:31.775 ****** 2025-10-02 12:06:48,007 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:48,020 p=33391 u=zuul n=ansible | TASK [test_operator : Call test stages loop _raw_params=stages.yml] ************ 2025-10-02 12:06:48,020 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.039) 0:00:31.814 ****** 2025-10-02 12:06:48,075 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/stages.yml for localhost => (item={'name': 'tempest', 'type': 'tempest'}) 2025-10-02 12:06:48,092 p=33391 u=zuul n=ansible | TASK [test_operator : Run stage tempest msg=Run stage {{ _stage_vars.name }}] *** 2025-10-02 12:06:48,092 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.072) 0:00:31.887 ****** 2025-10-02 12:06:48,112 p=33391 u=zuul n=ansible | ok: [localhost] => msg: Run stage tempest 2025-10-02 12:06:48,123 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:06:48,123 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.031) 0:00:31.918 ****** 2025-10-02 12:06:48,146 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:48,156 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:06:48,156 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.032) 0:00:31.950 ****** 2025-10-02 12:06:48,179 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:48,191 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_test_hooks _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:06:48,192 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.035) 0:00:31.986 ****** 2025-10-02 12:06:48,287 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:48,308 p=33391 u=zuul n=ansible | TASK [test_operator : Set empty stage vars dict stage_vars_dict={}] ************ 2025-10-02 12:06:48,308 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.116) 0:00:32.102 ****** 2025-10-02 12:06:48,330 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:48,341 p=33391 u=zuul n=ansible | TASK [test_operator : Include stage var file file={{ _stage_vars.test_vars_file | default('/dev/null') }}, name=_stage_var_file] *** 2025-10-02 12:06:48,341 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.033) 0:00:32.136 ****** 2025-10-02 12:06:48,366 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:48,377 p=33391 u=zuul n=ansible | TASK [test_operator : Merge file vars and test vars _stage_test_vars={{ file_vars | combine(test_vars) }}] *** 2025-10-02 12:06:48,377 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.035) 0:00:32.171 ****** 2025-10-02 12:06:48,401 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:48,415 p=33391 u=zuul n=ansible | TASK [test_operator : Overwrite global_vars with stage_vars stage_vars_dict={{ stage_vars_dict | combine({item.key: _stage_test_vars[item.key] | default(lookup('vars', item.key, default=omit)) }) }}] *** 2025-10-02 12:06:48,415 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:48 +0000 (0:00:00.037) 0:00:32.209 ****** 2025-10-02 12:06:49,067 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_run_hook_debug', 'value': '{{ (ansible_verbosity | int) >= 2 | bool }}'}) 2025-10-02 12:06:49,076 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_os_net_setup_config', 'value': [{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}]}) 2025-10-02 12:06:49,085 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_os_net_subnetpool_config', 'value': [{'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}, {'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}]}) 2025-10-02 12:06:49,098 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_os_net_setup_dry_run', 'value': False}) 2025-10-02 12:06:49,110 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_os_net_setup_namespace', 'value': 'openstack'}) 2025-10-02 12:06:49,119 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_dir', 'value': "{{ lookup('env', 'HOME') }}"}) 2025-10-02 12:06:49,129 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'openstack_namespace', 'value': 'openstack'}) 2025-10-02 12:06:49,149 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_stages', 'value': [{'name': 'tempest', 'type': 'tempest'}]}) 2025-10-02 12:06:49,164 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_on_test_failure', 'value': True}) 2025-10-02 12:06:49,179 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_artifacts_basedir', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/tests/test_operator"}) 2025-10-02 12:06:49,191 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_namespace', 'value': 'openstack'}) 2025-10-02 12:06:49,204 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_namespace', 'value': 'openstack-operators'}) 2025-10-02 12:06:49,213 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_bundle', 'value': ''}) 2025-10-02 12:06:49,226 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_timeout', 'value': 3600}) 2025-10-02 12:06:49,238 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_logs_image', 'value': 'quay.io/quay/busybox'}) 2025-10-02 12:06:49,250 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_cleanup', 'value': False}) 2025-10-02 12:06:49,259 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_clean_last_run', 'value': False}) 2025-10-02 12:06:49,268 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_dry_run', 'value': False}) 2025-10-02 12:06:49,277 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_groups', 'value': ['default']}) 2025-10-02 12:06:49,285 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_jobs', 'value': ['default']}) 2025-10-02 12:06:49,296 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_fast', 'value': False}) 2025-10-02 12:06:49,307 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class_prefix', 'value': "{{ 'lvms-' if cifmw_use_lvms | default(false) | bool else '' }}"}) 2025-10-02 12:06:49,317 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class', 'value': '{{ cifmw_test_operator_storage_class_prefix }}local-storage'}) 2025-10-02 12:06:49,327 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_delete_logs_pod', 'value': False}) 2025-10-02 12:06:49,337 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_privileged', 'value': True}) 2025-10-02 12:06:49,347 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_selinux_level', 'value': 's0:c478,c978'}) 2025-10-02 12:06:49,360 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crs_path', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/test-operator-crs"}) 2025-10-02 12:06:49,370 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_log_pod_definition', 'value': {'apiVersion': 'v1', 'kind': 'Pod', 'metadata': {'name': 'test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'containers': [{'name': 'test-operator-logs-container', 'image': '{{ cifmw_test_operator_logs_image }}', 'command': ['sleep'], 'args': ['infinity'], 'volumeMounts': '{{ _test_operator_volume_mounts }}'}], 'volumes': '{{ _test_operator_volumes }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}'}}}) 2025-10-02 12:06:49,379 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_registry', 'value': 'quay.io'}) 2025-10-02 12:06:49,390 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_namespace', 'value': 'podified-antelope-centos9'}) 2025-10-02 12:06:49,402 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_image_tag', 'value': 'current-podified'}) 2025-10-02 12:06:49,411 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_name', 'value': 'tempest-tests'}) 2025-10-02 12:06:49,424 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_concurrency', 'value': 1}) 2025-10-02 12:06:49,439 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_registry', 'value': "{{ content_provider_os_registry_url | split('/') | first }}"}) 2025-10-02 12:06:49,455 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_namespace', 'value': "{{ content_provider_os_registry_url | split('/') | last }}"}) 2025-10-02 12:06:49,466 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_container', 'value': 'openstack-tempest-all'}) 2025-10-02 12:06:49,476 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tempest_registry }}/{{ stage_vars_dict.cifmw_test_operator_tempest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tempest_container }}'}) 2025-10-02 12:06:49,484 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image_tag', 'value': 'watcher_latest'}) 2025-10-02 12:06:49,491 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_network_attachments', 'value': []}) 2025-10-02 12:06:49,499 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_include_override_scenario', 'value': False}) 2025-10-02 12:06:49,507 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_exclude_override_scenario', 'value': False}) 2025-10-02 12:06:49,514 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_workflow', 'value': []}) 2025-10-02 12:06:49,524 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_cleanup', 'value': False}) 2025-10-02 12:06:49,533 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_failed_tests', 'value': False}) 2025-10-02 12:06:49,543 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_override_status', 'value': False}) 2025-10-02 12:06:49,555 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_resources', 'value': {'requests': {}, 'limits': {}}}) 2025-10-02 12:06:49,562 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_tempest_tempestconf_config_defaults', 'value': {'deployerInput': "[auth]\ntempest_roles =\n\n[enforce_scope]\nbarbican = true\ncinder = true\ndesignate = true\nglance = true\nironic = true\nironic_inspector = true\nneutron = true\nnova = true\noctavia = true\nkeystone = true\nmanila = true\nplacement = true\n\n[identity-feature-enabled]\nenforce_scope = true\n\n[compute-feature-enabled]\ndhcp_domain = ''\n\n[load_balancer]\nmember_role = load-balancer_member\nadmin_role = load-balancer_admin\nRBAC_test_type = keystone_default_roles\nenforce_new_defaults = true\nenforce_scope = false\n\n[volume]\ncatalog_type = volumev3\n"}}) 2025-10-02 12:06:49,572 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_debug', 'value': False}) 2025-10-02 12:06:49,608 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tempest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tempest_image }}:{{ stage_vars_dict.cifmw_test_operator_tempest_image_tag }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'parallel': '{{ stage_vars_dict.cifmw_test_operator_tempest_parallel | default(omit) }}', 'SSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_tempest_ssh_key_secret_name | default(omit) }}', 'configOverwrite': '{{ stage_vars_dict.cifmw_test_operator_tempest_config_overwrite | default(omit) }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tempest_network_attachments }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_configmaps_mounts | default(omit) }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tempest_resources | default(omit) }}', 'tempestRun': {'includeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_include_list | default('') }}\n", 'excludeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_exclude_list | default('') }}\n", 'expectedFailuresList': "{{ stage_vars_dict.cifmw_test_operator_tempest_expected_failures_list | default('') }}\n", 'concurrency': '{{ stage_vars_dict.cifmw_test_operator_tempest_concurrency }}', 'externalPlugin': '{{ stage_vars_dict.cifmw_test_operator_tempest_external_plugin | default([]) }}', 'extraRPMs': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_rpms | default([]) }}', 'extraImages': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_images | default([]) }}'}, 'tempestconfRun': '{{ cifmw_tempest_tempestconf_config_defaults | combine(stage_vars_dict.cifmw_test_operator_tempest_tempestconf_config | default({})) }}', 'cleanup': '{{ stage_vars_dict.cifmw_test_operator_tempest_cleanup | bool }}', 'rerunFailedTests': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_failed_tests | bool }}', 'rerunOverrideStatus': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_override_status | bool }}', 'timingDataUrl': '{{ stage_vars_dict.cifmw_test_operator_tempest_timing_data_url | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tempest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tempest_debug }}'}}}) 2025-10-02 12:06:49,618 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_name', 'value': 'tobiko-tests'}) 2025-10-02 12:06:49,627 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-10-02 12:06:49,639 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-10-02 12:06:49,650 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_container', 'value': 'openstack-tobiko'}) 2025-10-02 12:06:49,664 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tobiko_registry }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_container }}'}) 2025-10-02 12:06:49,678 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-10-02 12:06:49,688 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_testenv', 'value': 'scenario'}) 2025-10-02 12:06:49,699 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_version', 'value': 'master'}) 2025-10-02 12:06:49,708 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_pytest_addopts', 'value': None}) 2025-10-02 12:06:49,717 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_prevent_create', 'value': None}) 2025-10-02 12:06:49,726 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_num_processes', 'value': None}) 2025-10-02 12:06:49,734 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_advanced_image_url', 'value': 'https://softwarefactory-project.io/ubuntu-minimal-customized-enp3s0'}) 2025-10-02 12:06:49,743 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_override_conf', 'value': {}}) 2025-10-02 12:06:49,752 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kubeconfig_secret', 'value': 'tobiko-secret'}) 2025-10-02 12:06:49,762 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_openstack_cmd', 'value': 'oc -n openstack exec openstackclient -- openstack'}) 2025-10-02 12:06:49,771 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_cleanup', 'value': False}) 2025-10-02 12:06:49,781 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keytype', 'value': "{{ cifmw_ssh_keytype | default('ecdsa') }}"}) 2025-10-02 12:06:49,790 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keysize', 'value': '{{ cifmw_ssh_keysize | default(521) }}'}) 2025-10-02 12:06:49,801 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_debug', 'value': False}) 2025-10-02 12:06:49,811 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_network_attachments', 'value': []}) 2025-10-02 12:06:49,821 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_workflow', 'value': []}) 2025-10-02 12:06:49,846 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tobiko', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tobiko_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'kubeconfigSecretName': '{{ stage_vars_dict.cifmw_test_operator_tobiko_kubeconfig_secret }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tobiko_image }}:{{ stage_vars_dict.cifmw_test_operator_tobiko_image_tag }}', 'testenv': '{{ stage_vars_dict.cifmw_test_operator_tobiko_testenv }}', 'version': '{{ stage_vars_dict.cifmw_test_operator_tobiko_version }}', 'patch': '{{ stage_vars_dict.cifmw_test_operator_tobiko_patch | default(omit) }}', 'pytestAddopts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts if stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts is not none else omit }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tobiko_debug }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tobiko_network_attachments }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tobiko_resources | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tobiko_workflow }}'}}}) 2025-10-02 12:06:49,855 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_name', 'value': 'ansibletest'}) 2025-10-02 12:06:49,866 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-10-02 12:06:49,875 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-10-02 12:06:49,884 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_container', 'value': 'openstack-ansible-tests'}) 2025-10-02 12:06:49,896 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_registry }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_container }}'}) 2025-10-02 12:06:49,910 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-10-02 12:06:49,920 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_compute_ssh_key_secret_name', 'value': 'dataplane-ansible-ssh-private-key-secret'}) 2025-10-02 12:06:49,930 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workload_ssh_key_secret_name', 'value': ''}) 2025-10-02 12:06:49,940 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_git_repo', 'value': ''}) 2025-10-02 12:06:49,951 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_playbook_path', 'value': ''}) 2025-10-02 12:06:49,961 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_collection', 'value': ''}) 2025-10-02 12:06:49,971 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_var_files', 'value': ''}) 2025-10-02 12:06:49,981 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_extra_vars', 'value': ''}) 2025-10-02 12:06:49,989 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_inventory', 'value': ''}) 2025-10-02 12:06:49,997 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_map', 'value': 'openstack-config'}) 2025-10-02 12:06:50,009 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_secret', 'value': 'openstack-config-secret'}) 2025-10-02 12:06:50,018 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_debug', 'value': False}) 2025-10-02 12:06:50,028 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workflow', 'value': []}) 2025-10-02 12:06:50,039 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_extra_configmaps_mounts', 'value': []}) 2025-10-02 12:06:50,067 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'AnsibleTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_image }}:{{ stage_vars_dict.cifmw_test_operator_ansibletest_image_tag }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_configmaps_mounts }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_mounts | default(omit) }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'computeSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_compute_ssh_key_secret_name }}', 'workloadSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workload_ssh_key_secret_name }}', 'ansibleGitRepo': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_git_repo }}', 'ansiblePlaybookPath': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_playbook_path }}', 'ansibleCollections': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_collection }}', 'ansibleVarFiles': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_var_files }}', 'ansibleExtraVars': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_extra_vars }}', 'ansibleInventory': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_inventory }}', 'openStackConfigMap': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_map }}', 'openStackConfigSecret': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_secret }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_debug }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_resources | default(omit) }}'}}}) 2025-10-02 12:06:50,077 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_name', 'value': 'horizontest-tests'}) 2025-10-02 12:06:50,086 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2025-10-02 12:06:50,097 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2025-10-02 12:06:50,108 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_container', 'value': 'openstack-horizontest'}) 2025-10-02 12:06:50,120 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_horizontest_registry }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_container }}'}) 2025-10-02 12:06:50,132 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2025-10-02 12:06:50,143 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_username', 'value': 'admin'}) 2025-10-02 12:06:50,157 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_password', 'value': '12345678'}) 2025-10-02 12:06:50,170 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_dashboard_url', 'value': 'https://horizon-openstack.apps.ocp.openstack.lab/'}) 2025-10-02 12:06:50,186 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_auth_url', 'value': 'https://keystone-public-openstack.apps.ocp.openstack.lab'}) 2025-10-02 12:06:50,197 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_repo_url', 'value': 'https://review.opendev.org/openstack/horizon'}) 2025-10-02 12:06:50,210 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_repo_branch', 'value': 'master'}) 2025-10-02 12:06:50,220 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_url', 'value': 'http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img'}) 2025-10-02 12:06:50,230 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name', 'value': 'horizontest'}) 2025-10-02 12:06:50,240 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_user', 'value': 'horizontest'}) 2025-10-02 12:06:50,251 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_password', 'value': 'horizontest'}) 2025-10-02 12:06:50,260 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_flavor_name', 'value': 'm1.tiny'}) 2025-10-02 12:06:50,270 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_logs_directory_name', 'value': 'horizon'}) 2025-10-02 12:06:50,281 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_debug', 'value': False}) 2025-10-02 12:06:50,290 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_test_dir', 'value': '/var/lib/horizontest'}) 2025-10-02 12:06:50,300 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_extra_flag', 'value': 'not pagination'}) 2025-10-02 12:06:50,309 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name_xpath', 'value': "//span[@class='rcueicon rcueicon-folder-open']/ancestor::li"}) 2025-10-02 12:06:50,338 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'HorizonTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_horizontest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image }}:{{ stage_vars_dict.cifmw_test_operator_horizontest_image_tag }}', 'adminUsername': '{{ stage_vars_dict.cifmw_test_operator_horizontest_admin_username }}', 'adminPassword': '{{ stage_vars_dict.cifmw_test_operator_horizontest_admin_password | string }}', 'dashboardUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_dashboard_url }}', 'authUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_auth_url }}', 'repoUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_repo_url }}', 'horizonRepoBranch': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_repo_branch }}', 'imageUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image_url }}', 'projectName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name }}', 'user': '{{ stage_vars_dict.cifmw_test_operator_horizontest_user }}', 'password': '{{ stage_vars_dict.cifmw_test_operator_horizontest_password }}', 'flavorName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_flavor_name }}', 'logsDirectoryName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_logs_directory_name }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_horizontest_debug }}', 'extraFlag': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_flag }}', 'projectNameXpath': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name_xpath }}', 'horizonTestDir': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_test_dir }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_horizontest_resources | default(omit) }}'}}}) 2025-10-02 12:06:50,343 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_artifacts_basedir', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/tests/compliance"}) 2025-10-02 12:06:50,348 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_cleanup', 'value': True}) 2025-10-02 12:06:50,356 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_compute_profiles', 'value': ['pci-dss', 'e8', 'stig']}) 2025-10-02 12:06:50,363 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_compute_artifacts_basedir', 'value': "{{ ansible_user_dir ~ '/compliance-scans' }}"}) 2025-10-02 12:06:50,371 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_dry_run', 'value': False}) 2025-10-02 12:06:50,377 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_namespace', 'value': 'openshift-compliance'}) 2025-10-02 12:06:50,382 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_plugin_image', 'value': 'registry.redhat.io/compliance/oc-compliance-rhel8:stable'}) 2025-10-02 12:06:50,389 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_podman_registry', 'value': 'registry.redhat.io'}) 2025-10-02 12:06:50,396 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_scan_settings', 'value': {'cis': ['ocp4-cis'], 'e8': ['ocp4-e8', 'rhcos4-e8'], 'high': ['ocp4-high', 'ocp4-high-node', 'rhcos4-high'], 'moderate': ['ocp4-moderate', 'ocp4-moderate-node', 'rhcos4-moderate'], 'nerc-cip': ['ocp4-nerc-cip', 'ocp4-nerc-cip-node'], 'pci-dss': ['ocp4-pci-dss', 'ocp4-pci-dss-node'], 'stig': ['ocp4-stig', 'ocp4-stig-node', 'rhcos4-stig']}}) 2025-10-02 12:06:50,402 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_scap_content_file', 'value': '/usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml'}) 2025-10-02 12:06:50,408 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_compliance_suites', 'value': ['cis', 'e8', 'high', 'moderate', 'nerc-cip', 'pci-dss', 'stig']}) 2025-10-02 12:06:50,414 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_artifacts_crc_sshkey', 'value': '~/.ssh/id_cifw'}) 2025-10-02 12:06:50,419 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_build_images_output', 'value': {}}) 2025-10-02 12:06:50,425 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_dlrn_report_result', 'value': False}) 2025-10-02 12:06:50,432 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_edpm_telemetry_enabled_exporters', 'value': ['podman_exporter', 'openstack_network_exporter']}) 2025-10-02 12:06:50,438 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_extras', 'value': ["@{{ ansible_user_dir }}/{{ zuul.projects['github.com/openstack-k8s-operators/ci-framework']. src_dir }}/scenarios/centos-9/multinode-ci.yml", "@{{ ansible_user_dir }}/{{ zuul.projects['github.com/openstack-k8s-operators/ci-framework']. src_dir }}/scenarios/centos-9/horizon.yml", "@{{ ansible_user_dir }}/{{ zuul.projects['github.com/openstack-k8s-operators/watcher-operator']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml", "@{{ ansible_user_dir }}/{{ zuul.projects['github.com/openstack-k8s-operators/watcher-operator']. src_dir }}/ci/tests/watcher-tempest.yml"]}) 2025-10-02 12:06:50,443 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_api', 'value': 'api.crc.testing:6443'}) 2025-10-02 12:06:50,448 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_kubeconfig', 'value': '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig'}) 2025-10-02 12:06:50,453 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_password', 'value': '123456789'}) 2025-10-02 12:06:50,458 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_skip_tls_verify', 'value': True}) 2025-10-02 12:06:50,463 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_user', 'value': 'kubeadmin'}) 2025-10-02 12:06:50,468 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_operator_build_output', 'value': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}}) 2025-10-02 12:06:50,479 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_external_plugin', 'value': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}]}) 2025-10-02 12:06:50,483 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers_openstack', 'value': False}) 2025-10-02 12:06:50,489 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers_org', 'value': 'podified-epoxy-centos9'}) 2025-10-02 12:06:50,494 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers_registry', 'value': "{{ content_provider_os_registry_url | split('/') | first }}"}) 2025-10-02 12:06:50,500 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers_tag', 'value': 'watcher_latest'}) 2025-10-02 12:06:50,505 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers_watcher', 'value': True}) 2025-10-02 12:06:50,511 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_use_libvirt', 'value': False}) 2025-10-02 12:06:50,516 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_zuul_target_host', 'value': 'controller'}) 2025-10-02 12:06:50,555 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'content_provider_dlrn_md5_hash', 'value': ''}) 2025-10-02 12:06:50,562 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'content_provider_os_registry_url', 'value': '38.129.56.134:5001/podified-epoxy-centos9'}) 2025-10-02 12:06:50,567 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'content_provider_registry_ip', 'value': '38.129.56.134'}) 2025-10-02 12:06:50,573 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'crc_ci_bootstrap_cloud_name', 'value': "{{ nodepool.cloud | replace('-nodepool-tripleo','') }}"}) 2025-10-02 12:06:50,579 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'crc_ci_bootstrap_networking', 'value': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': "{{ ('ibm' in nodepool.cloud) | ternary('1440', '1500') }}", 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}}) 2025-10-02 12:06:50,584 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'enable_ramdisk', 'value': True}) 2025-10-02 12:06:50,589 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'fetch_dlrn_hash', 'value': False}) 2025-10-02 12:06:50,594 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'push_registry', 'value': 'quay.rdoproject.org'}) 2025-10-02 12:06:50,598 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'quay_login_secret_name', 'value': 'quay_nextgen_zuulgithubci'}) 2025-10-02 12:06:50,603 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'registry_login_enabled', 'value': True}) 2025-10-02 12:06:50,608 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'watcher_scenario', 'value': 'edpm-no-notifications'}) 2025-10-02 12:06:50,613 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'watcher_services_tag', 'value': 'watcher_latest'}) 2025-10-02 12:06:50,618 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'watcher_tempest_max_microversion', 'value': '1.4'}) 2025-10-02 12:06:50,626 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'zuul', 'value': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}}) 2025-10-02 12:06:50,630 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'zuul_log_collection', 'value': False}) 2025-10-02 12:06:50,634 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'inventory_file', 'value': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'}) 2025-10-02 12:06:50,639 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'inventory_dir', 'value': '/home/zuul/ci-framework-data/artifacts'}) 2025-10-02 12:06:50,644 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_connection', 'value': 'local'}) 2025-10-02 12:06:50,651 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'inventory_hostname', 'value': 'localhost'}) 2025-10-02 12:06:50,657 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'inventory_hostname_short', 'value': 'localhost'}) 2025-10-02 12:06:50,664 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'group_names', 'value': ['ungrouped']}) 2025-10-02 12:06:50,684 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_facts', 'value': {'all_ipv4_addresses': ['38.102.83.234', '192.168.122.11'], 'all_ipv6_addresses': ['fe80::f816:3eff:fed0:d11d'], 'apparmor': {'status': 'disabled'}, 'architecture': 'x86_64', 'bios_date': '04/01/2014', 'bios_vendor': 'SeaBIOS', 'bios_version': '1.15.0-1', 'board_asset_tag': 'NA', 'board_name': 'NA', 'board_serial': 'NA', 'board_vendor': 'NA', 'board_version': 'NA', 'chassis_asset_tag': 'NA', 'chassis_serial': 'NA', 'chassis_vendor': 'QEMU', 'chassis_version': 'pc-i440fx-6.2', 'cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404423', 'epoch_int': '1759404423', 'hour': '11', 'iso8601': '2025-10-02T11:27:03Z', 'iso8601_basic': '20251002T112703559411', 'iso8601_basic_short': '20251002T112703', 'iso8601_micro': '2025-10-02T11:27:03.559411Z', 'minute': '27', 'month': '10', 'second': '03', 'time': '11:27:03', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'default_ipv4': {'address': '38.102.83.234', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d0:d1:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'default_ipv6': {}, 'device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-24-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-24-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '83883999', 'sectorsize': 512, 'size': '40.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '83886080', 'sectorsize': '512', 'size': '40.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'distribution': 'CentOS', 'distribution_file_parsed': True, 'distribution_file_path': '/etc/centos-release', 'distribution_file_variety': 'CentOS', 'distribution_major_version': '9', 'distribution_release': 'Stream', 'distribution_version': '9', 'dns': {'nameservers': ['192.168.122.10', '199.204.44.24', '199.204.47.54']}, 'domain': '', 'effective_group_id': 1000, 'effective_user_id': 1000, 'env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '2', 'SSH_CLIENT': '38.102.83.114 46100 22', 'SSH_CONNECTION': '38.102.83.114 46100 38.102.83.234 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '9', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.234', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed0:d11d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d0:d1:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.11', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f4:c5:7f', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'fibre_channel_wwn': [], 'fips': False, 'form_factor': 'Other', 'fqdn': 'controller', 'hostname': 'controller', 'hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'interfaces': ['eth1', 'eth0', 'lo'], 'is_chroot': False, 'iscsi_iqn': '', 'kernel': '5.14.0-620.el9.x86_64', 'kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'loadavg': {'15m': 0.46, '1m': 1.39, '5m': 0.89}, 'ansible_local': {}, 'locally_reachable_ips': {'ipv4': ['38.102.83.234', '127.0.0.0/8', '127.0.0.1', '192.168.122.11'], 'ipv6': ['::1', 'fe80::f816:3eff:fed0:d11d']}, 'lsb': {}, 'lvm': 'N/A', 'machine': 'x86_64', 'machine_id': '42833e1b511a402df82cb9cb2fc36491', 'memfree_mb': 1416, 'memory_mb': {'nocache': {'free': 2856, 'used': 799}, 'real': {'free': 1416, 'total': 3655, 'used': 2239}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'memtotal_mb': 3655, 'mounts': [{'block_available': 9529128, 'block_size': 4096, 'block_total': 10469115, 'block_used': 939987, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 20820648, 'inode_total': 20970992, 'inode_used': 150344, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 39031308288, 'size_total': 42881495040, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'nodename': 'controller', 'os_family': 'RedHat', 'pkg_mgr': 'dnf', 'proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'processor_cores': 1, 'processor_count': 2, 'processor_nproc': 2, 'processor_threads_per_core': 1, 'processor_vcpus': 2, 'product_name': 'OpenStack Nova', 'product_serial': 'NA', 'product_uuid': 'NA', 'product_version': '26.2.1', 'python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'python_version': '3.9.23', 'real_group_id': 1000, 'real_user_id': 1000, 'selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'selinux_python_present': True, 'service_mgr': 'systemd', 'ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGG4MzHlfwvzeT3W/zrr6TJ2cSQd6hyBBPmn1XwhNIr/KW6MPYk90J6OKQdbxeCEbEBM5K/vOJFDhs/PMeoubu4=', 'ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIHjgsVCPXLzIRvcCo758q6qxwbewyur4jVPU9eTKThxl', 'ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ssh_host_key_rsa_public': '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', 'ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'swapfree_mb': 0, 'swaptotal_mb': 0, 'system': 'Linux', 'system_capabilities': [''], 'system_capabilities_enforced': 'True', 'system_vendor': 'OpenStack Foundation', 'uptime_seconds': 803, 'user_dir': '/home/zuul', 'user_gecos': '', 'user_gid': 1000, 'user_id': 'zuul', 'user_shell': '/bin/bash', 'user_uid': 1000, 'userspace_architecture': 'x86_64', 'userspace_bits': '64', 'virtualization_role': 'guest', 'virtualization_tech_guest': ['openstack'], 'virtualization_tech_host': ['kvm'], 'virtualization_type': 'openstack', 'cifmw_discovered_hash': '0653754d2af8079f7c677f47fa5006beb1f727ca036526ac8bf07bf53cd43e47', 'cifmw_discovered_hash_algorithm': 'sha256', 'cifmw_discovered_image_name': 'CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_discovered_image_url': 'https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_edpm_deploy_env': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_TAG': 'a0eac564d779a7eaac46c9816bff261a', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/home/zuul/ci-framework-data/nova-extra-config.conf', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_SINGLE_NODE': 'false', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['0.0.0.0/0']", 'DATAPLANE_TOTAL_NODES': 2, 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'PATH': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'SSH_KEY_FILE': '/home/zuul/.ssh/id_cifw', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_install_yamls_defaults': {'ADOPTED_EXTERNAL_NETWORK': '172.21.1.0/24', 'ADOPTED_INTERNALAPI_NETWORK': '172.17.1.0/24', 'ADOPTED_STORAGEMGMT_NETWORK': '172.20.1.0/24', 'ADOPTED_STORAGE_NETWORK': '172.18.1.0/24', 'ADOPTED_TENANT_NETWORK': '172.9.1.0/24', 'ANSIBLEEE': 'config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_BRANCH': 'main', 'ANSIBLEEE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest', 'ANSIBLEEE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml', 'ANSIBLEEE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests', 'ANSIBLEEE_KUTTL_NAMESPACE': 'ansibleee-kuttl-tests', 'ANSIBLEEE_REPO': 'https://github.com/openstack-k8s-operators/openstack-ansibleee-operator', 'ANSIBLEE_COMMIT_HASH': '', 'BARBICAN': 'config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_BRANCH': 'main', 'BARBICAN_COMMIT_HASH': '', 'BARBICAN_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_DEPL_IMG': 'unused', 'BARBICAN_IMG': 'quay.io/openstack-k8s-operators/barbican-operator-index:latest', 'BARBICAN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml', 'BARBICAN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests', 'BARBICAN_KUTTL_NAMESPACE': 'barbican-kuttl-tests', 'BARBICAN_REPO': 'https://github.com/openstack-k8s-operators/barbican-operator.git', 'BARBICAN_SERVICE_ENABLED': 'true', 'BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY': 'sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=', 'BAREMETAL_BRANCH': 'main', 'BAREMETAL_COMMIT_HASH': '', 'BAREMETAL_IMG': 'quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest', 'BAREMETAL_OS_CONTAINER_IMG': '', 'BAREMETAL_OS_IMG': '', 'BAREMETAL_REPO': 'https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git', 'BAREMETAL_TIMEOUT': '20m', 'BASH_IMG': 'quay.io/openstack-k8s-operators/bash:latest', 'BGP_ASN': '64999', 'BGP_LEAF_1': '100.65.4.1', 'BGP_LEAF_2': '100.64.4.1', 'BGP_OVN_ROUTING': 'false', 'BGP_PEER_ASN': '64999', 'BGP_SOURCE_IP': '172.30.4.2', 'BGP_SOURCE_IP6': 'f00d:f00d:f00d:f00d:f00d:f00d:f00d:42', 'BMAAS_BRIDGE_IPV4_PREFIX': '172.20.1.2/24', 'BMAAS_BRIDGE_IPV6_PREFIX': 'fd00:bbbb::2/64', 'BMAAS_INSTANCE_DISK_SIZE': '20', 'BMAAS_INSTANCE_MEMORY': '4096', 'BMAAS_INSTANCE_NAME_PREFIX': 'crc-bmaas', 'BMAAS_INSTANCE_NET_MODEL': 'virtio', 'BMAAS_INSTANCE_OS_VARIANT': 'centos-stream9', 'BMAAS_INSTANCE_VCPUS': '2', 'BMAAS_INSTANCE_VIRT_TYPE': 'kvm', 'BMAAS_IPV4': 'true', 'BMAAS_IPV6': 'false', 'BMAAS_LIBVIRT_USER': 'sushyemu', 'BMAAS_METALLB_ADDRESS_POOL': '172.20.1.64/26', 'BMAAS_METALLB_POOL_NAME': 'baremetal', 'BMAAS_NETWORK_IPV4_PREFIX': '172.20.1.1/24', 'BMAAS_NETWORK_IPV6_PREFIX': 'fd00:bbbb::1/64', 'BMAAS_NETWORK_NAME': 'crc-bmaas', 'BMAAS_NODE_COUNT': '1', 'BMAAS_OCP_INSTANCE_NAME': 'crc', 'BMAAS_REDFISH_PASSWORD': 'password', 'BMAAS_REDFISH_USERNAME': 'admin', 'BMAAS_ROUTE_LIBVIRT_NETWORKS': 'crc-bmaas,crc,default', 'BMAAS_SUSHY_EMULATOR_DRIVER': 'libvirt', 'BMAAS_SUSHY_EMULATOR_IMAGE': 'quay.io/metal3-io/sushy-tools:latest', 'BMAAS_SUSHY_EMULATOR_NAMESPACE': 'sushy-emulator', 'BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE': '/etc/openstack/clouds.yaml', 'BMAAS_SUSHY_EMULATOR_OS_CLOUD': 'openstack', 'BMH_NAMESPACE': 'openstack', 'BMO_BRANCH': 'release-0.9', 'BMO_COMMIT_HASH': '', 'BMO_IPA_BRANCH': 'stable/2024.1', 'BMO_IRONIC_HOST': '192.168.122.10', 'BMO_PROVISIONING_INTERFACE': '', 'BMO_REPO': 'https://github.com/metal3-io/baremetal-operator', 'BMO_SETUP': False, 'BMO_SETUP_ROUTE_REPLACE': 'true', 'BM_CTLPLANE_INTERFACE': 'enp1s0', 'BM_INSTANCE_MEMORY': '8192', 'BM_INSTANCE_NAME_PREFIX': 'edpm-compute-baremetal', 'BM_INSTANCE_NAME_SUFFIX': '0', 'BM_NETWORK_NAME': 'default', 'BM_NODE_COUNT': '1', 'BM_ROOT_PASSWORD': '', 'BM_ROOT_PASSWORD_SECRET': '', 'CEILOMETER_CENTRAL_DEPL_IMG': 'unused', 'CEILOMETER_NOTIFICATION_DEPL_IMG': 'unused', 'CEPH_BRANCH': 'release-1.15', 'CEPH_CLIENT': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml', 'CEPH_COMMON': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml', 'CEPH_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml', 'CEPH_CRDS': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml', 'CEPH_IMG': 'quay.io/ceph/demo:latest-squid', 'CEPH_OP': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml', 'CEPH_REPO': 'https://github.com/rook/rook.git', 'CERTMANAGER_TIMEOUT': '300s', 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'CINDER': 'config/samples/cinder_v1beta1_cinder.yaml', 'CINDERAPI_DEPL_IMG': 'unused', 'CINDERBKP_DEPL_IMG': 'unused', 'CINDERSCH_DEPL_IMG': 'unused', 'CINDERVOL_DEPL_IMG': 'unused', 'CINDER_BRANCH': 'main', 'CINDER_COMMIT_HASH': '', 'CINDER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml', 'CINDER_IMG': 'quay.io/openstack-k8s-operators/cinder-operator-index:latest', 'CINDER_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml', 'CINDER_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests', 'CINDER_KUTTL_NAMESPACE': 'cinder-kuttl-tests', 'CINDER_REPO': 'https://github.com/openstack-k8s-operators/cinder-operator.git', 'CLEANUP_DIR_CMD': 'rm -Rf', 'CRC_BGP_NIC_1_MAC': '52:54:00:11:11:11', 'CRC_BGP_NIC_2_MAC': '52:54:00:11:11:12', 'CRC_HTTPS_PROXY': '', 'CRC_HTTP_PROXY': '', 'CRC_STORAGE_NAMESPACE': 'crc-storage', 'CRC_STORAGE_RETRIES': '3', 'CRC_URL': "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", 'CRC_VERSION': 'latest', 'DATAPLANE_ANSIBLE_SECRET': 'dataplane-ansible-ssh-private-key-secret', 'DATAPLANE_ANSIBLE_USER': '', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_PREFIX': 'openstack', 'DATAPLANE_CONTAINER_TAG': 'current-podified', 'DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest', 'DATAPLANE_DEFAULT_GW': '192.168.122.1', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/dev/null', 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=100%', 'DATAPLANE_KUSTOMIZE_SCENARIO': 'preprovisioned', 'DATAPLANE_NETWORKER_IP': '192.168.122.200', 'DATAPLANE_NETWORK_INTERFACE_NAME': 'eth0', 'DATAPLANE_NOVA_NFS_PATH': '', 'DATAPLANE_NTP_SERVER': 'pool.ntp.org', 'DATAPLANE_PLAYBOOK': 'osp.edpm.download_cache', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_RUNNER_IMG': '', 'DATAPLANE_SERVER_ROLE': 'compute', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['192.168.122.0/24']", 'DATAPLANE_TIMEOUT': '30m', 'DATAPLANE_TLS_ENABLED': 'true', 'DATAPLANE_TOTAL_NETWORKER_NODES': '1', 'DATAPLANE_TOTAL_NODES': '1', 'DBSERVICE': 'galera', 'DESIGNATE': 'config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_BRANCH': 'main', 'DESIGNATE_COMMIT_HASH': '', 'DESIGNATE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_IMG': 'quay.io/openstack-k8s-operators/designate-operator-index:latest', 'DESIGNATE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml', 'DESIGNATE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests', 'DESIGNATE_KUTTL_NAMESPACE': 'designate-kuttl-tests', 'DESIGNATE_REPO': 'https://github.com/openstack-k8s-operators/designate-operator.git', 'DNSDATA': 'config/samples/network_v1beta1_dnsdata.yaml', 'DNSDATA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml', 'DNSMASQ': 'config/samples/network_v1beta1_dnsmasq.yaml', 'DNSMASQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml', 'DNS_DEPL_IMG': 'unused', 'DNS_DOMAIN': 'localdomain', 'DOWNLOAD_TOOLS_SELECTION': 'all', 'EDPM_ATTACH_EXTNET': 'true', 'EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES': "'[]'", 'EDPM_COMPUTE_ADDITIONAL_NETWORKS': "'[]'", 'EDPM_COMPUTE_CELLS': '1', 'EDPM_COMPUTE_CEPH_ENABLED': 'true', 'EDPM_COMPUTE_CEPH_NOVA': 'true', 'EDPM_COMPUTE_DHCP_AGENT_ENABLED': 'true', 'EDPM_COMPUTE_SRIOV_ENABLED': 'true', 'EDPM_COMPUTE_SUFFIX': '0', 'EDPM_CONFIGURE_DEFAULT_ROUTE': 'true', 'EDPM_CONFIGURE_HUGEPAGES': 'false', 'EDPM_CONFIGURE_NETWORKING': 'true', 'EDPM_FIRSTBOOT_EXTRA': '/tmp/edpm-firstboot-extra', 'EDPM_NETWORKER_SUFFIX': '0', 'EDPM_TOTAL_NETWORKERS': '1', 'EDPM_TOTAL_NODES': '1', 'GALERA_REPLICAS': '', 'GENERATE_SSH_KEYS': 'true', 'GIT_CLONE_OPTS': '', 'GLANCE': 'config/samples/glance_v1beta1_glance.yaml', 'GLANCEAPI_DEPL_IMG': 'unused', 'GLANCE_BRANCH': 'main', 'GLANCE_COMMIT_HASH': '', 'GLANCE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml', 'GLANCE_IMG': 'quay.io/openstack-k8s-operators/glance-operator-index:latest', 'GLANCE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml', 'GLANCE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests', 'GLANCE_KUTTL_NAMESPACE': 'glance-kuttl-tests', 'GLANCE_REPO': 'https://github.com/openstack-k8s-operators/glance-operator.git', 'HEAT': 'config/samples/heat_v1beta1_heat.yaml', 'HEATAPI_DEPL_IMG': 'unused', 'HEATCFNAPI_DEPL_IMG': 'unused', 'HEATENGINE_DEPL_IMG': 'unused', 'HEAT_AUTH_ENCRYPTION_KEY': '767c3ed056cbaa3b9dfedb8c6f825bf0', 'HEAT_BRANCH': 'main', 'HEAT_COMMIT_HASH': '', 'HEAT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml', 'HEAT_IMG': 'quay.io/openstack-k8s-operators/heat-operator-index:latest', 'HEAT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml', 'HEAT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests', 'HEAT_KUTTL_NAMESPACE': 'heat-kuttl-tests', 'HEAT_REPO': 'https://github.com/openstack-k8s-operators/heat-operator.git', 'HEAT_SERVICE_ENABLED': 'true', 'HORIZON': 'config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_BRANCH': 'main', 'HORIZON_COMMIT_HASH': '', 'HORIZON_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_DEPL_IMG': 'unused', 'HORIZON_IMG': 'quay.io/openstack-k8s-operators/horizon-operator-index:latest', 'HORIZON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml', 'HORIZON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests', 'HORIZON_KUTTL_NAMESPACE': 'horizon-kuttl-tests', 'HORIZON_REPO': 'https://github.com/openstack-k8s-operators/horizon-operator.git', 'INFRA_BRANCH': 'main', 'INFRA_COMMIT_HASH': '', 'INFRA_IMG': 'quay.io/openstack-k8s-operators/infra-operator-index:latest', 'INFRA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml', 'INFRA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests', 'INFRA_KUTTL_NAMESPACE': 'infra-kuttl-tests', 'INFRA_REPO': 'https://github.com/openstack-k8s-operators/infra-operator.git', 'INSTALL_CERT_MANAGER': False, 'INSTALL_NMSTATE': 'true || false', 'INSTALL_NNCP': 'true || false', 'INTERNALAPI_HOST_ROUTES': '', 'IPV6_LAB_IPV4_NETWORK_IPADDRESS': '172.30.0.1/24', 'IPV6_LAB_IPV6_NETWORK_IPADDRESS': 'fd00:abcd:abcd:fc00::1/64', 'IPV6_LAB_LIBVIRT_STORAGE_POOL': 'default', 'IPV6_LAB_MANAGE_FIREWALLD': 'true', 'IPV6_LAB_NAT64_HOST_IPV4': '172.30.0.2/24', 'IPV6_LAB_NAT64_HOST_IPV6': 'fd00:abcd:abcd:fc00::2/64', 'IPV6_LAB_NAT64_INSTANCE_NAME': 'nat64-router', 'IPV6_LAB_NAT64_IPV6_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL': '192.168.255.0/24', 'IPV6_LAB_NAT64_TAYGA_IPV4': '192.168.255.1', 'IPV6_LAB_NAT64_TAYGA_IPV6': 'fd00:abcd:abcd:fc00::3', 'IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX': 'fd00:abcd:abcd:fcff::/96', 'IPV6_LAB_NAT64_UPDATE_PACKAGES': 'false', 'IPV6_LAB_NETWORK_NAME': 'nat64', 'IPV6_LAB_SNO_CLUSTER_NETWORK': 'fd00:abcd:0::/48', 'IPV6_LAB_SNO_HOST_IP': 'fd00:abcd:abcd:fc00::11', 'IPV6_LAB_SNO_HOST_PREFIX': '64', 'IPV6_LAB_SNO_INSTANCE_NAME': 'sno', 'IPV6_LAB_SNO_MACHINE_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_SNO_OCP_MIRROR_URL': 'https://mirror.openshift.com/pub/openshift-v4/clients/ocp', 'IPV6_LAB_SNO_OCP_VERSION': 'latest-4.14', 'IPV6_LAB_SNO_SERVICE_NETWORK': 'fd00:abcd:abcd:fc03::/112', 'IPV6_LAB_SSH_PUB_KEY': '/home/zuul/.ssh/id_rsa.pub', 'IPV6_LAB_WORK_DIR': '/home/zuul/.ipv6lab', 'IRONIC': 'config/samples/ironic_v1beta1_ironic.yaml', 'IRONICAPI_DEPL_IMG': 'unused', 'IRONICCON_DEPL_IMG': 'unused', 'IRONICINS_DEPL_IMG': 'unused', 'IRONICNAG_DEPL_IMG': 'unused', 'IRONICPXE_DEPL_IMG': 'unused', 'IRONIC_BRANCH': 'main', 'IRONIC_COMMIT_HASH': '', 'IRONIC_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml', 'IRONIC_IMAGE_TAG': 'release-24.1', 'IRONIC_IMG': 'quay.io/openstack-k8s-operators/ironic-operator-index:latest', 'IRONIC_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml', 'IRONIC_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests', 'IRONIC_KUTTL_NAMESPACE': 'ironic-kuttl-tests', 'IRONIC_REPO': 'https://github.com/openstack-k8s-operators/ironic-operator.git', 'KEYSTONEAPI': 'config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_DEPL_IMG': 'unused', 'KEYSTONE_BRANCH': 'main', 'KEYSTONE_COMMIT_HASH': '', 'KEYSTONE_FEDERATION_CLIENT_SECRET': 'COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f', 'KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE': 'openstack', 'KEYSTONE_IMG': 'quay.io/openstack-k8s-operators/keystone-operator-index:latest', 'KEYSTONE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml', 'KEYSTONE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests', 'KEYSTONE_KUTTL_NAMESPACE': 'keystone-kuttl-tests', 'KEYSTONE_REPO': 'https://github.com/openstack-k8s-operators/keystone-operator.git', 'KUBEADMIN_PWD': '12345678', 'LIBVIRT_SECRET': 'libvirt-secret', 'LOKI_DEPLOY_MODE': 'openshift-network', 'LOKI_DEPLOY_NAMESPACE': 'netobserv', 'LOKI_DEPLOY_SIZE': '1x.demo', 'LOKI_NAMESPACE': 'openshift-operators-redhat', 'LOKI_OPERATOR_GROUP': 'openshift-operators-redhat-loki', 'LOKI_SUBSCRIPTION': 'loki-operator', 'LVMS_CR': '1', 'MANILA': 'config/samples/manila_v1beta1_manila.yaml', 'MANILAAPI_DEPL_IMG': 'unused', 'MANILASCH_DEPL_IMG': 'unused', 'MANILASHARE_DEPL_IMG': 'unused', 'MANILA_BRANCH': 'main', 'MANILA_COMMIT_HASH': '', 'MANILA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml', 'MANILA_IMG': 'quay.io/openstack-k8s-operators/manila-operator-index:latest', 'MANILA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml', 'MANILA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests', 'MANILA_KUTTL_NAMESPACE': 'manila-kuttl-tests', 'MANILA_REPO': 'https://github.com/openstack-k8s-operators/manila-operator.git', 'MANILA_SERVICE_ENABLED': 'true', 'MARIADB': 'config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_BRANCH': 'main', 'MARIADB_CHAINSAW_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml', 'MARIADB_CHAINSAW_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests', 'MARIADB_CHAINSAW_NAMESPACE': 'mariadb-chainsaw-tests', 'MARIADB_COMMIT_HASH': '', 'MARIADB_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_DEPL_IMG': 'unused', 'MARIADB_IMG': 'quay.io/openstack-k8s-operators/mariadb-operator-index:latest', 'MARIADB_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml', 'MARIADB_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests', 'MARIADB_KUTTL_NAMESPACE': 'mariadb-kuttl-tests', 'MARIADB_REPO': 'https://github.com/openstack-k8s-operators/mariadb-operator.git', 'MEMCACHED': 'config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_DEPL_IMG': 'unused', 'METADATA_SHARED_SECRET': '1234567842', 'METALLB_IPV6_POOL': 'fd00:aaaa::80-fd00:aaaa::90', 'METALLB_POOL': '192.168.122.80-192.168.122.90', 'MICROSHIFT': '0', 'NAMESPACE': 'openstack', 'NETCONFIG': 'config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_DEPL_IMG': 'unused', 'NETOBSERV_DEPLOY_NAMESPACE': 'netobserv', 'NETOBSERV_NAMESPACE': 'openshift-netobserv-operator', 'NETOBSERV_OPERATOR_GROUP': 'openshift-netobserv-operator-net', 'NETOBSERV_SUBSCRIPTION': 'netobserv-operator', 'NETWORK_BGP': 'false', 'NETWORK_DESIGNATE_ADDRESS_PREFIX': '172.28.0', 'NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX': '172.50.0', 'NETWORK_INTERNALAPI_ADDRESS_PREFIX': '172.17.0', 'NETWORK_ISOLATION': 'true', 'NETWORK_ISOLATION_INSTANCE_NAME': 'crc', 'NETWORK_ISOLATION_IPV4': 'true', 'NETWORK_ISOLATION_IPV4_ADDRESS': '172.16.1.1/24', 'NETWORK_ISOLATION_IPV4_NAT': 'true', 'NETWORK_ISOLATION_IPV6': 'false', 'NETWORK_ISOLATION_IPV6_ADDRESS': 'fd00:aaaa::1/64', 'NETWORK_ISOLATION_IP_ADDRESS': '192.168.122.10', 'NETWORK_ISOLATION_MAC': '52:54:00:11:11:10', 'NETWORK_ISOLATION_NETWORK_NAME': 'net-iso', 'NETWORK_ISOLATION_NET_NAME': 'default', 'NETWORK_ISOLATION_USE_DEFAULT_NETWORK': 'true', 'NETWORK_MTU': '1500', 'NETWORK_STORAGEMGMT_ADDRESS_PREFIX': '172.20.0', 'NETWORK_STORAGE_ADDRESS_PREFIX': '172.18.0', 'NETWORK_STORAGE_MACVLAN': '', 'NETWORK_TENANT_ADDRESS_PREFIX': '172.19.0', 'NETWORK_VLAN_START': '20', 'NETWORK_VLAN_STEP': '1', 'NEUTRONAPI': 'config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_DEPL_IMG': 'unused', 'NEUTRON_BRANCH': 'main', 'NEUTRON_COMMIT_HASH': '', 'NEUTRON_IMG': 'quay.io/openstack-k8s-operators/neutron-operator-index:latest', 'NEUTRON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml', 'NEUTRON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests', 'NEUTRON_KUTTL_NAMESPACE': 'neutron-kuttl-tests', 'NEUTRON_REPO': 'https://github.com/openstack-k8s-operators/neutron-operator.git', 'NFS_HOME': '/home/nfs', 'NMSTATE_NAMESPACE': 'openshift-nmstate', 'NMSTATE_OPERATOR_GROUP': 'openshift-nmstate-tn6k8', 'NMSTATE_SUBSCRIPTION': 'kubernetes-nmstate-operator', 'NNCP_ADDITIONAL_HOST_ROUTES': '', 'NNCP_BGP_1_INTERFACE': 'enp7s0', 'NNCP_BGP_1_IP_ADDRESS': '100.65.4.2', 'NNCP_BGP_2_INTERFACE': 'enp8s0', 'NNCP_BGP_2_IP_ADDRESS': '100.64.4.2', 'NNCP_BRIDGE': 'ospbr', 'NNCP_CLEANUP_TIMEOUT': '120s', 'NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX': 'fd00:aaaa::', 'NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX': '10', 'NNCP_CTLPLANE_IP_ADDRESS_PREFIX': '192.168.122', 'NNCP_CTLPLANE_IP_ADDRESS_SUFFIX': '10', 'NNCP_DNS_SERVER': '192.168.122.1', 'NNCP_DNS_SERVER_IPV6': 'fd00:aaaa::1', 'NNCP_GATEWAY': '192.168.122.1', 'NNCP_GATEWAY_IPV6': 'fd00:aaaa::1', 'NNCP_INTERFACE': 'enp6s0', 'NNCP_NODES': '', 'NNCP_TIMEOUT': '240s', 'NOVA': 'config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_BRANCH': 'main', 'NOVA_COMMIT_HASH': '', 'NOVA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_IMG': 'quay.io/openstack-k8s-operators/nova-operator-index:latest', 'NOVA_REPO': 'https://github.com/openstack-k8s-operators/nova-operator.git', 'NUMBER_OF_INSTANCES': '1', 'OCP_NETWORK_NAME': 'crc', 'OCTAVIA': 'config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_BRANCH': 'main', 'OCTAVIA_COMMIT_HASH': '', 'OCTAVIA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_IMG': 'quay.io/openstack-k8s-operators/octavia-operator-index:latest', 'OCTAVIA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml', 'OCTAVIA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests', 'OCTAVIA_KUTTL_NAMESPACE': 'octavia-kuttl-tests', 'OCTAVIA_REPO': 'https://github.com/openstack-k8s-operators/octavia-operator.git', 'OKD': 'false', 'OPENSTACK_BRANCH': 'main', 'OPENSTACK_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-bundle:latest', 'OPENSTACK_COMMIT_HASH': '', 'OPENSTACK_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_CRDS_DIR': 'openstack_crds', 'OPENSTACK_CTLPLANE': 'config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-index:latest', 'OPENSTACK_K8S_BRANCH': 'main', 'OPENSTACK_K8S_TAG': 'latest', 'OPENSTACK_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml', 'OPENSTACK_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests', 'OPENSTACK_KUTTL_NAMESPACE': 'openstack-kuttl-tests', 'OPENSTACK_NEUTRON_CUSTOM_CONF': '', 'OPENSTACK_REPO': 'https://github.com/openstack-k8s-operators/openstack-operator.git', 'OPENSTACK_STORAGE_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest', 'OPERATOR_BASE_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator', 'OPERATOR_CHANNEL': '', 'OPERATOR_NAMESPACE': 'openstack-operators', 'OPERATOR_SOURCE': '', 'OPERATOR_SOURCE_NAMESPACE': '', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'OVNCONTROLLER': 'config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_NMAP': 'true', 'OVNDBS': 'config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNDBS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNNORTHD': 'config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVNNORTHD_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVN_BRANCH': 'main', 'OVN_COMMIT_HASH': '', 'OVN_IMG': 'quay.io/openstack-k8s-operators/ovn-operator-index:latest', 'OVN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml', 'OVN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests', 'OVN_KUTTL_NAMESPACE': 'ovn-kuttl-tests', 'OVN_REPO': 'https://github.com/openstack-k8s-operators/ovn-operator.git', 'PASSWORD': '12345678', 'PLACEMENTAPI': 'config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_DEPL_IMG': 'unused', 'PLACEMENT_BRANCH': 'main', 'PLACEMENT_COMMIT_HASH': '', 'PLACEMENT_IMG': 'quay.io/openstack-k8s-operators/placement-operator-index:latest', 'PLACEMENT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml', 'PLACEMENT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests', 'PLACEMENT_KUTTL_NAMESPACE': 'placement-kuttl-tests', 'PLACEMENT_REPO': 'https://github.com/openstack-k8s-operators/placement-operator.git', 'PULL_SECRET': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt', 'RABBITMQ': 'docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_BRANCH': 'patches', 'RABBITMQ_COMMIT_HASH': '', 'RABBITMQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_DEPL_IMG': 'unused', 'RABBITMQ_IMG': 'quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest', 'RABBITMQ_REPO': 'https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git', 'REDHAT_OPERATORS': 'false', 'REDIS': 'config/samples/redis_v1beta1_redis.yaml', 'REDIS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml', 'REDIS_DEPL_IMG': 'unused', 'RH_REGISTRY_PWD': '', 'RH_REGISTRY_USER': '', 'SECRET': 'osp-secret', 'SG_CORE_DEPL_IMG': 'unused', 'STANDALONE_COMPUTE_DRIVER': 'libvirt', 'STANDALONE_EXTERNAL_NET_PREFFIX': '172.21.0', 'STANDALONE_INTERNALAPI_NET_PREFIX': '172.17.0', 'STANDALONE_STORAGEMGMT_NET_PREFIX': '172.20.0', 'STANDALONE_STORAGE_NET_PREFIX': '172.18.0', 'STANDALONE_TENANT_NET_PREFIX': '172.19.0', 'STORAGEMGMT_HOST_ROUTES': '', 'STORAGE_CLASS': 'local-storage', 'STORAGE_HOST_ROUTES': '', 'SWIFT': 'config/samples/swift_v1beta1_swift.yaml', 'SWIFT_BRANCH': 'main', 'SWIFT_COMMIT_HASH': '', 'SWIFT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml', 'SWIFT_IMG': 'quay.io/openstack-k8s-operators/swift-operator-index:latest', 'SWIFT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml', 'SWIFT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests', 'SWIFT_KUTTL_NAMESPACE': 'swift-kuttl-tests', 'SWIFT_REPO': 'https://github.com/openstack-k8s-operators/swift-operator.git', 'TELEMETRY': 'config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_BRANCH': 'main', 'TELEMETRY_COMMIT_HASH': '', 'TELEMETRY_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_IMG': 'quay.io/openstack-k8s-operators/telemetry-operator-index:latest', 'TELEMETRY_KUTTL_BASEDIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator', 'TELEMETRY_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml', 'TELEMETRY_KUTTL_NAMESPACE': 'telemetry-kuttl-tests', 'TELEMETRY_KUTTL_RELPATH': 'tests/kuttl/suites', 'TELEMETRY_REPO': 'https://github.com/openstack-k8s-operators/telemetry-operator.git', 'TENANT_HOST_ROUTES': '', 'TIMEOUT': '300s', 'TLS_ENABLED': 'false', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'tripleo_deploy': 'export REGISTRY_PWD:'}, 'cifmw_install_yamls_environment': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_openshift_api': 'https://api.crc.testing:6443', 'cifmw_openshift_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_login_api': 'https://api.crc.testing:6443', 'cifmw_openshift_login_cert_login': False, 'cifmw_openshift_login_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_login_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_login_password': 123456789, 'cifmw_openshift_login_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_openshift_login_user': 'kubeadmin', 'cifmw_openshift_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_openshift_user': 'kubeadmin', 'cifmw_path': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'cifmw_repo_setup_commit_hash': None, 'cifmw_repo_setup_distro_hash': None, 'cifmw_repo_setup_dlrn_api_url': 'https://trunk.rdoproject.org/api-centos9-antelope', 'cifmw_repo_setup_dlrn_url': 'https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5', 'cifmw_repo_setup_extended_hash': None, 'cifmw_repo_setup_full_hash': 'a0eac564d779a7eaac46c9816bff261a', 'cifmw_repo_setup_release': 'antelope', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True}}) 2025-10-02 12:06:50,688 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_all_ipv4_addresses', 'value': ['38.102.83.234', '192.168.122.11']}) 2025-10-02 12:06:50,690 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_all_ipv6_addresses', 'value': ['fe80::f816:3eff:fed0:d11d']}) 2025-10-02 12:06:50,698 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_apparmor', 'value': {'status': 'disabled'}}) 2025-10-02 12:06:50,704 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_architecture', 'value': 'x86_64'}) 2025-10-02 12:06:50,711 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_bios_date', 'value': '04/01/2014'}) 2025-10-02 12:06:50,716 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_bios_vendor', 'value': 'SeaBIOS'}) 2025-10-02 12:06:50,721 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_bios_version', 'value': '1.15.0-1'}) 2025-10-02 12:06:50,727 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_board_asset_tag', 'value': 'NA'}) 2025-10-02 12:06:50,732 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_board_name', 'value': 'NA'}) 2025-10-02 12:06:50,738 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_board_serial', 'value': 'NA'}) 2025-10-02 12:06:50,744 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_board_vendor', 'value': 'NA'}) 2025-10-02 12:06:50,750 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_board_version', 'value': 'NA'}) 2025-10-02 12:06:50,756 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_chassis_asset_tag', 'value': 'NA'}) 2025-10-02 12:06:50,762 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_chassis_serial', 'value': 'NA'}) 2025-10-02 12:06:50,769 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_chassis_vendor', 'value': 'QEMU'}) 2025-10-02 12:06:50,774 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_chassis_version', 'value': 'pc-i440fx-6.2'}) 2025-10-02 12:06:50,780 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_cmdline', 'value': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}}) 2025-10-02 12:06:50,787 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_date_time', 'value': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404423', 'epoch_int': '1759404423', 'hour': '11', 'iso8601': '2025-10-02T11:27:03Z', 'iso8601_basic': '20251002T112703559411', 'iso8601_basic_short': '20251002T112703', 'iso8601_micro': '2025-10-02T11:27:03.559411Z', 'minute': '27', 'month': '10', 'second': '03', 'time': '11:27:03', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}}) 2025-10-02 12:06:50,793 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_default_ipv4', 'value': {'address': '38.102.83.234', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d0:d1:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}}) 2025-10-02 12:06:50,799 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_default_ipv6', 'value': {}}) 2025-10-02 12:06:50,804 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_device_links', 'value': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-24-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}}) 2025-10-02 12:06:50,811 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_devices', 'value': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-24-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '83883999', 'sectorsize': 512, 'size': '40.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '83886080', 'sectorsize': '512', 'size': '40.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}}) 2025-10-02 12:06:50,817 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution', 'value': 'CentOS'}) 2025-10-02 12:06:50,822 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_file_parsed', 'value': True}) 2025-10-02 12:06:50,827 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_file_path', 'value': '/etc/centos-release'}) 2025-10-02 12:06:50,832 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_file_variety', 'value': 'CentOS'}) 2025-10-02 12:06:50,837 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_major_version', 'value': '9'}) 2025-10-02 12:06:50,843 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_release', 'value': 'Stream'}) 2025-10-02 12:06:50,848 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_distribution_version', 'value': '9'}) 2025-10-02 12:06:50,852 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_dns', 'value': {'nameservers': ['192.168.122.10', '199.204.44.24', '199.204.47.54']}}) 2025-10-02 12:06:50,858 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_domain', 'value': ''}) 2025-10-02 12:06:50,864 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_effective_group_id', 'value': 1000}) 2025-10-02 12:06:50,870 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_effective_user_id', 'value': 1000}) 2025-10-02 12:06:50,876 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_env', 'value': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '2', 'SSH_CLIENT': '38.102.83.114 46100 22', 'SSH_CONNECTION': '38.102.83.114 46100 38.102.83.234 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '9', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}}) 2025-10-02 12:06:50,882 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_eth0', 'value': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.234', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed0:d11d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d0:d1:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}}) 2025-10-02 12:06:50,888 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_eth1', 'value': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.11', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f4:c5:7f', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}}) 2025-10-02 12:06:50,893 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_fibre_channel_wwn', 'value': []}) 2025-10-02 12:06:50,899 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_fips', 'value': False}) 2025-10-02 12:06:50,904 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_form_factor', 'value': 'Other'}) 2025-10-02 12:06:50,910 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_fqdn', 'value': 'controller'}) 2025-10-02 12:06:50,916 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_hostname', 'value': 'controller'}) 2025-10-02 12:06:50,922 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_hostnqn', 'value': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0'}) 2025-10-02 12:06:50,929 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_interfaces', 'value': ['eth1', 'eth0', 'lo']}) 2025-10-02 12:06:50,934 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_is_chroot', 'value': False}) 2025-10-02 12:06:50,939 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_iscsi_iqn', 'value': ''}) 2025-10-02 12:06:50,944 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_kernel', 'value': '5.14.0-620.el9.x86_64'}) 2025-10-02 12:06:50,949 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_kernel_version', 'value': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025'}) 2025-10-02 12:06:50,955 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_lo', 'value': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}}) 2025-10-02 12:06:50,962 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_loadavg', 'value': {'15m': 0.46, '1m': 1.39, '5m': 0.89}}) 2025-10-02 12:06:50,969 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_local', 'value': {}}) 2025-10-02 12:06:50,974 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_locally_reachable_ips', 'value': {'ipv4': ['38.102.83.234', '127.0.0.0/8', '127.0.0.1', '192.168.122.11'], 'ipv6': ['::1', 'fe80::f816:3eff:fed0:d11d']}}) 2025-10-02 12:06:50,980 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_lsb', 'value': {}}) 2025-10-02 12:06:50,986 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_lvm', 'value': 'N/A'}) 2025-10-02 12:06:50,992 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_machine', 'value': 'x86_64'}) 2025-10-02 12:06:50,999 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_machine_id', 'value': '42833e1b511a402df82cb9cb2fc36491'}) 2025-10-02 12:06:51,005 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_memfree_mb', 'value': 1416}) 2025-10-02 12:06:51,011 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_memory_mb', 'value': {'nocache': {'free': 2856, 'used': 799}, 'real': {'free': 1416, 'total': 3655, 'used': 2239}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}}) 2025-10-02 12:06:51,018 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_memtotal_mb', 'value': 3655}) 2025-10-02 12:06:51,025 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_mounts', 'value': [{'block_available': 9529128, 'block_size': 4096, 'block_total': 10469115, 'block_used': 939987, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 20820648, 'inode_total': 20970992, 'inode_used': 150344, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 39031308288, 'size_total': 42881495040, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}]}) 2025-10-02 12:06:51,031 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_nodename', 'value': 'controller'}) 2025-10-02 12:06:51,037 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_os_family', 'value': 'RedHat'}) 2025-10-02 12:06:51,042 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_pkg_mgr', 'value': 'dnf'}) 2025-10-02 12:06:51,049 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_proc_cmdline', 'value': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}}) 2025-10-02 12:06:51,055 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor', 'value': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor']}) 2025-10-02 12:06:51,060 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor_cores', 'value': 1}) 2025-10-02 12:06:51,065 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor_count', 'value': 2}) 2025-10-02 12:06:51,070 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor_nproc', 'value': 2}) 2025-10-02 12:06:51,075 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor_threads_per_core', 'value': 1}) 2025-10-02 12:06:51,081 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_processor_vcpus', 'value': 2}) 2025-10-02 12:06:51,088 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_product_name', 'value': 'OpenStack Nova'}) 2025-10-02 12:06:51,093 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_product_serial', 'value': 'NA'}) 2025-10-02 12:06:51,098 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_product_uuid', 'value': 'NA'}) 2025-10-02 12:06:51,104 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_product_version', 'value': '26.2.1'}) 2025-10-02 12:06:51,109 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_python', 'value': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}}) 2025-10-02 12:06:51,114 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_python_version', 'value': '3.9.23'}) 2025-10-02 12:06:51,120 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_real_group_id', 'value': 1000}) 2025-10-02 12:06:51,125 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_real_user_id', 'value': 1000}) 2025-10-02 12:06:51,130 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_selinux', 'value': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}}) 2025-10-02 12:06:51,135 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_selinux_python_present', 'value': True}) 2025-10-02 12:06:51,140 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_service_mgr', 'value': 'systemd'}) 2025-10-02 12:06:51,145 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_ecdsa_public', 'value': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGG4MzHlfwvzeT3W/zrr6TJ2cSQd6hyBBPmn1XwhNIr/KW6MPYk90J6OKQdbxeCEbEBM5K/vOJFDhs/PMeoubu4='}) 2025-10-02 12:06:51,150 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_ecdsa_public_keytype', 'value': 'ecdsa-sha2-nistp256'}) 2025-10-02 12:06:51,155 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_ed25519_public', 'value': 'AAAAC3NzaC1lZDI1NTE5AAAAIHjgsVCPXLzIRvcCo758q6qxwbewyur4jVPU9eTKThxl'}) 2025-10-02 12:06:51,160 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_ed25519_public_keytype', 'value': 'ssh-ed25519'}) 2025-10-02 12:06:51,165 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_rsa_public', 'value': 'AAAAB3NzaC1yc2EAAAADAQABAAABgQCRJ8VhreeIro+qbaqiN7NegGrhE5CVL0p5aAbIrhDXVnFmUY0nUjinTHB51xzNjBXch/0MGv8LjN2+sq50JNF7WJHs4T4ZLrPLVhM0GoA4GuYKI6oeMWjTDnw2sAEyGA9C33Hs5T3zo7wnEWZeM7fdSYareOPNvbVFIai0QgroKxk05wsBGBMlslw0492UAbhWLq5ZidF6du7WotdWpKePdZJt5tfBdYh83i5cEUCzJQ2+TNp+Xtv6p0q60GiU3MlO0rGxUJGhlUi2Ocj7CS39fj0bp0NWp3IZlyfdCB/YrDItEGX6rLnFdZ0FxZxM7ripOXx1If4lRLmlq+w/gE/llEqv8Rb6OY22+bRBs4ClBBSctpagUnfRfdsbrn7TDj2SUJXiliiZRnErYuveNXugmXHf1xEoc+OD4v3P5eo8/P7d1KZVKR8SJHLtMEQc1H3933ejBMtybNy3qAzdPEnYGDF54JdbxobeNrgx86Jg9QKGKv+h86RzwdE+8yv9mHE='}) 2025-10-02 12:06:51,169 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_ssh_host_key_rsa_public_keytype', 'value': 'ssh-rsa'}) 2025-10-02 12:06:51,174 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_swapfree_mb', 'value': 0}) 2025-10-02 12:06:51,179 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_swaptotal_mb', 'value': 0}) 2025-10-02 12:06:51,184 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_system', 'value': 'Linux'}) 2025-10-02 12:06:51,189 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_system_capabilities', 'value': ['']}) 2025-10-02 12:06:51,193 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_system_capabilities_enforced', 'value': 'True'}) 2025-10-02 12:06:51,199 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_system_vendor', 'value': 'OpenStack Foundation'}) 2025-10-02 12:06:51,203 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_uptime_seconds', 'value': 803}) 2025-10-02 12:06:51,208 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_gecos', 'value': ''}) 2025-10-02 12:06:51,213 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_gid', 'value': 1000}) 2025-10-02 12:06:51,219 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_id', 'value': 'zuul'}) 2025-10-02 12:06:51,224 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_shell', 'value': '/bin/bash'}) 2025-10-02 12:06:51,229 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_user_uid', 'value': 1000}) 2025-10-02 12:06:51,234 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_userspace_architecture', 'value': 'x86_64'}) 2025-10-02 12:06:51,241 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_userspace_bits', 'value': '64'}) 2025-10-02 12:06:51,247 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_virtualization_role', 'value': 'guest'}) 2025-10-02 12:06:51,254 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_virtualization_tech_guest', 'value': ['openstack']}) 2025-10-02 12:06:51,260 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_virtualization_tech_host', 'value': ['kvm']}) 2025-10-02 12:06:51,266 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_virtualization_type', 'value': 'openstack'}) 2025-10-02 12:06:51,271 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_discovered_hash', 'value': '0653754d2af8079f7c677f47fa5006beb1f727ca036526ac8bf07bf53cd43e47'}) 2025-10-02 12:06:51,276 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_discovered_hash_algorithm', 'value': 'sha256'}) 2025-10-02 12:06:51,281 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_discovered_image_name', 'value': 'CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2'}) 2025-10-02 12:06:51,285 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_discovered_image_url', 'value': 'https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2'}) 2025-10-02 12:06:51,290 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_edpm_deploy_env', 'value': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_TAG': 'a0eac564d779a7eaac46c9816bff261a', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/home/zuul/ci-framework-data/nova-extra-config.conf', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_SINGLE_NODE': 'false', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['0.0.0.0/0']", 'DATAPLANE_TOTAL_NODES': 2, 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'PATH': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'SSH_KEY_FILE': '/home/zuul/.ssh/id_cifw', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}}) 2025-10-02 12:06:51,298 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_install_yamls_defaults', 'value': {'ADOPTED_EXTERNAL_NETWORK': '172.21.1.0/24', 'ADOPTED_INTERNALAPI_NETWORK': '172.17.1.0/24', 'ADOPTED_STORAGEMGMT_NETWORK': '172.20.1.0/24', 'ADOPTED_STORAGE_NETWORK': '172.18.1.0/24', 'ADOPTED_TENANT_NETWORK': '172.9.1.0/24', 'ANSIBLEEE': 'config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_BRANCH': 'main', 'ANSIBLEEE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest', 'ANSIBLEEE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml', 'ANSIBLEEE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests', 'ANSIBLEEE_KUTTL_NAMESPACE': 'ansibleee-kuttl-tests', 'ANSIBLEEE_REPO': 'https://github.com/openstack-k8s-operators/openstack-ansibleee-operator', 'ANSIBLEE_COMMIT_HASH': '', 'BARBICAN': 'config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_BRANCH': 'main', 'BARBICAN_COMMIT_HASH': '', 'BARBICAN_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_DEPL_IMG': 'unused', 'BARBICAN_IMG': 'quay.io/openstack-k8s-operators/barbican-operator-index:latest', 'BARBICAN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml', 'BARBICAN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests', 'BARBICAN_KUTTL_NAMESPACE': 'barbican-kuttl-tests', 'BARBICAN_REPO': 'https://github.com/openstack-k8s-operators/barbican-operator.git', 'BARBICAN_SERVICE_ENABLED': 'true', 'BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY': 'sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=', 'BAREMETAL_BRANCH': 'main', 'BAREMETAL_COMMIT_HASH': '', 'BAREMETAL_IMG': 'quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest', 'BAREMETAL_OS_CONTAINER_IMG': '', 'BAREMETAL_OS_IMG': '', 'BAREMETAL_REPO': 'https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git', 'BAREMETAL_TIMEOUT': '20m', 'BASH_IMG': 'quay.io/openstack-k8s-operators/bash:latest', 'BGP_ASN': '64999', 'BGP_LEAF_1': '100.65.4.1', 'BGP_LEAF_2': '100.64.4.1', 'BGP_OVN_ROUTING': 'false', 'BGP_PEER_ASN': '64999', 'BGP_SOURCE_IP': '172.30.4.2', 'BGP_SOURCE_IP6': 'f00d:f00d:f00d:f00d:f00d:f00d:f00d:42', 'BMAAS_BRIDGE_IPV4_PREFIX': '172.20.1.2/24', 'BMAAS_BRIDGE_IPV6_PREFIX': 'fd00:bbbb::2/64', 'BMAAS_INSTANCE_DISK_SIZE': '20', 'BMAAS_INSTANCE_MEMORY': '4096', 'BMAAS_INSTANCE_NAME_PREFIX': 'crc-bmaas', 'BMAAS_INSTANCE_NET_MODEL': 'virtio', 'BMAAS_INSTANCE_OS_VARIANT': 'centos-stream9', 'BMAAS_INSTANCE_VCPUS': '2', 'BMAAS_INSTANCE_VIRT_TYPE': 'kvm', 'BMAAS_IPV4': 'true', 'BMAAS_IPV6': 'false', 'BMAAS_LIBVIRT_USER': 'sushyemu', 'BMAAS_METALLB_ADDRESS_POOL': '172.20.1.64/26', 'BMAAS_METALLB_POOL_NAME': 'baremetal', 'BMAAS_NETWORK_IPV4_PREFIX': '172.20.1.1/24', 'BMAAS_NETWORK_IPV6_PREFIX': 'fd00:bbbb::1/64', 'BMAAS_NETWORK_NAME': 'crc-bmaas', 'BMAAS_NODE_COUNT': '1', 'BMAAS_OCP_INSTANCE_NAME': 'crc', 'BMAAS_REDFISH_PASSWORD': 'password', 'BMAAS_REDFISH_USERNAME': 'admin', 'BMAAS_ROUTE_LIBVIRT_NETWORKS': 'crc-bmaas,crc,default', 'BMAAS_SUSHY_EMULATOR_DRIVER': 'libvirt', 'BMAAS_SUSHY_EMULATOR_IMAGE': 'quay.io/metal3-io/sushy-tools:latest', 'BMAAS_SUSHY_EMULATOR_NAMESPACE': 'sushy-emulator', 'BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE': '/etc/openstack/clouds.yaml', 'BMAAS_SUSHY_EMULATOR_OS_CLOUD': 'openstack', 'BMH_NAMESPACE': 'openstack', 'BMO_BRANCH': 'release-0.9', 'BMO_COMMIT_HASH': '', 'BMO_IPA_BRANCH': 'stable/2024.1', 'BMO_IRONIC_HOST': '192.168.122.10', 'BMO_PROVISIONING_INTERFACE': '', 'BMO_REPO': 'https://github.com/metal3-io/baremetal-operator', 'BMO_SETUP': False, 'BMO_SETUP_ROUTE_REPLACE': 'true', 'BM_CTLPLANE_INTERFACE': 'enp1s0', 'BM_INSTANCE_MEMORY': '8192', 'BM_INSTANCE_NAME_PREFIX': 'edpm-compute-baremetal', 'BM_INSTANCE_NAME_SUFFIX': '0', 'BM_NETWORK_NAME': 'default', 'BM_NODE_COUNT': '1', 'BM_ROOT_PASSWORD': '', 'BM_ROOT_PASSWORD_SECRET': '', 'CEILOMETER_CENTRAL_DEPL_IMG': 'unused', 'CEILOMETER_NOTIFICATION_DEPL_IMG': 'unused', 'CEPH_BRANCH': 'release-1.15', 'CEPH_CLIENT': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml', 'CEPH_COMMON': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml', 'CEPH_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml', 'CEPH_CRDS': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml', 'CEPH_IMG': 'quay.io/ceph/demo:latest-squid', 'CEPH_OP': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml', 'CEPH_REPO': 'https://github.com/rook/rook.git', 'CERTMANAGER_TIMEOUT': '300s', 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'CINDER': 'config/samples/cinder_v1beta1_cinder.yaml', 'CINDERAPI_DEPL_IMG': 'unused', 'CINDERBKP_DEPL_IMG': 'unused', 'CINDERSCH_DEPL_IMG': 'unused', 'CINDERVOL_DEPL_IMG': 'unused', 'CINDER_BRANCH': 'main', 'CINDER_COMMIT_HASH': '', 'CINDER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml', 'CINDER_IMG': 'quay.io/openstack-k8s-operators/cinder-operator-index:latest', 'CINDER_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml', 'CINDER_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests', 'CINDER_KUTTL_NAMESPACE': 'cinder-kuttl-tests', 'CINDER_REPO': 'https://github.com/openstack-k8s-operators/cinder-operator.git', 'CLEANUP_DIR_CMD': 'rm -Rf', 'CRC_BGP_NIC_1_MAC': '52:54:00:11:11:11', 'CRC_BGP_NIC_2_MAC': '52:54:00:11:11:12', 'CRC_HTTPS_PROXY': '', 'CRC_HTTP_PROXY': '', 'CRC_STORAGE_NAMESPACE': 'crc-storage', 'CRC_STORAGE_RETRIES': '3', 'CRC_URL': "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", 'CRC_VERSION': 'latest', 'DATAPLANE_ANSIBLE_SECRET': 'dataplane-ansible-ssh-private-key-secret', 'DATAPLANE_ANSIBLE_USER': '', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_PREFIX': 'openstack', 'DATAPLANE_CONTAINER_TAG': 'current-podified', 'DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest', 'DATAPLANE_DEFAULT_GW': '192.168.122.1', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/dev/null', 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=100%', 'DATAPLANE_KUSTOMIZE_SCENARIO': 'preprovisioned', 'DATAPLANE_NETWORKER_IP': '192.168.122.200', 'DATAPLANE_NETWORK_INTERFACE_NAME': 'eth0', 'DATAPLANE_NOVA_NFS_PATH': '', 'DATAPLANE_NTP_SERVER': 'pool.ntp.org', 'DATAPLANE_PLAYBOOK': 'osp.edpm.download_cache', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_RUNNER_IMG': '', 'DATAPLANE_SERVER_ROLE': 'compute', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['192.168.122.0/24']", 'DATAPLANE_TIMEOUT': '30m', 'DATAPLANE_TLS_ENABLED': 'true', 'DATAPLANE_TOTAL_NETWORKER_NODES': '1', 'DATAPLANE_TOTAL_NODES': '1', 'DBSERVICE': 'galera', 'DESIGNATE': 'config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_BRANCH': 'main', 'DESIGNATE_COMMIT_HASH': '', 'DESIGNATE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_IMG': 'quay.io/openstack-k8s-operators/designate-operator-index:latest', 'DESIGNATE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml', 'DESIGNATE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests', 'DESIGNATE_KUTTL_NAMESPACE': 'designate-kuttl-tests', 'DESIGNATE_REPO': 'https://github.com/openstack-k8s-operators/designate-operator.git', 'DNSDATA': 'config/samples/network_v1beta1_dnsdata.yaml', 'DNSDATA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml', 'DNSMASQ': 'config/samples/network_v1beta1_dnsmasq.yaml', 'DNSMASQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml', 'DNS_DEPL_IMG': 'unused', 'DNS_DOMAIN': 'localdomain', 'DOWNLOAD_TOOLS_SELECTION': 'all', 'EDPM_ATTACH_EXTNET': 'true', 'EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES': "'[]'", 'EDPM_COMPUTE_ADDITIONAL_NETWORKS': "'[]'", 'EDPM_COMPUTE_CELLS': '1', 'EDPM_COMPUTE_CEPH_ENABLED': 'true', 'EDPM_COMPUTE_CEPH_NOVA': 'true', 'EDPM_COMPUTE_DHCP_AGENT_ENABLED': 'true', 'EDPM_COMPUTE_SRIOV_ENABLED': 'true', 'EDPM_COMPUTE_SUFFIX': '0', 'EDPM_CONFIGURE_DEFAULT_ROUTE': 'true', 'EDPM_CONFIGURE_HUGEPAGES': 'false', 'EDPM_CONFIGURE_NETWORKING': 'true', 'EDPM_FIRSTBOOT_EXTRA': '/tmp/edpm-firstboot-extra', 'EDPM_NETWORKER_SUFFIX': '0', 'EDPM_TOTAL_NETWORKERS': '1', 'EDPM_TOTAL_NODES': '1', 'GALERA_REPLICAS': '', 'GENERATE_SSH_KEYS': 'true', 'GIT_CLONE_OPTS': '', 'GLANCE': 'config/samples/glance_v1beta1_glance.yaml', 'GLANCEAPI_DEPL_IMG': 'unused', 'GLANCE_BRANCH': 'main', 'GLANCE_COMMIT_HASH': '', 'GLANCE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml', 'GLANCE_IMG': 'quay.io/openstack-k8s-operators/glance-operator-index:latest', 'GLANCE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml', 'GLANCE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests', 'GLANCE_KUTTL_NAMESPACE': 'glance-kuttl-tests', 'GLANCE_REPO': 'https://github.com/openstack-k8s-operators/glance-operator.git', 'HEAT': 'config/samples/heat_v1beta1_heat.yaml', 'HEATAPI_DEPL_IMG': 'unused', 'HEATCFNAPI_DEPL_IMG': 'unused', 'HEATENGINE_DEPL_IMG': 'unused', 'HEAT_AUTH_ENCRYPTION_KEY': '767c3ed056cbaa3b9dfedb8c6f825bf0', 'HEAT_BRANCH': 'main', 'HEAT_COMMIT_HASH': '', 'HEAT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml', 'HEAT_IMG': 'quay.io/openstack-k8s-operators/heat-operator-index:latest', 'HEAT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml', 'HEAT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests', 'HEAT_KUTTL_NAMESPACE': 'heat-kuttl-tests', 'HEAT_REPO': 'https://github.com/openstack-k8s-operators/heat-operator.git', 'HEAT_SERVICE_ENABLED': 'true', 'HORIZON': 'config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_BRANCH': 'main', 'HORIZON_COMMIT_HASH': '', 'HORIZON_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_DEPL_IMG': 'unused', 'HORIZON_IMG': 'quay.io/openstack-k8s-operators/horizon-operator-index:latest', 'HORIZON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml', 'HORIZON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests', 'HORIZON_KUTTL_NAMESPACE': 'horizon-kuttl-tests', 'HORIZON_REPO': 'https://github.com/openstack-k8s-operators/horizon-operator.git', 'INFRA_BRANCH': 'main', 'INFRA_COMMIT_HASH': '', 'INFRA_IMG': 'quay.io/openstack-k8s-operators/infra-operator-index:latest', 'INFRA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml', 'INFRA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests', 'INFRA_KUTTL_NAMESPACE': 'infra-kuttl-tests', 'INFRA_REPO': 'https://github.com/openstack-k8s-operators/infra-operator.git', 'INSTALL_CERT_MANAGER': False, 'INSTALL_NMSTATE': 'true || false', 'INSTALL_NNCP': 'true || false', 'INTERNALAPI_HOST_ROUTES': '', 'IPV6_LAB_IPV4_NETWORK_IPADDRESS': '172.30.0.1/24', 'IPV6_LAB_IPV6_NETWORK_IPADDRESS': 'fd00:abcd:abcd:fc00::1/64', 'IPV6_LAB_LIBVIRT_STORAGE_POOL': 'default', 'IPV6_LAB_MANAGE_FIREWALLD': 'true', 'IPV6_LAB_NAT64_HOST_IPV4': '172.30.0.2/24', 'IPV6_LAB_NAT64_HOST_IPV6': 'fd00:abcd:abcd:fc00::2/64', 'IPV6_LAB_NAT64_INSTANCE_NAME': 'nat64-router', 'IPV6_LAB_NAT64_IPV6_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL': '192.168.255.0/24', 'IPV6_LAB_NAT64_TAYGA_IPV4': '192.168.255.1', 'IPV6_LAB_NAT64_TAYGA_IPV6': 'fd00:abcd:abcd:fc00::3', 'IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX': 'fd00:abcd:abcd:fcff::/96', 'IPV6_LAB_NAT64_UPDATE_PACKAGES': 'false', 'IPV6_LAB_NETWORK_NAME': 'nat64', 'IPV6_LAB_SNO_CLUSTER_NETWORK': 'fd00:abcd:0::/48', 'IPV6_LAB_SNO_HOST_IP': 'fd00:abcd:abcd:fc00::11', 'IPV6_LAB_SNO_HOST_PREFIX': '64', 'IPV6_LAB_SNO_INSTANCE_NAME': 'sno', 'IPV6_LAB_SNO_MACHINE_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_SNO_OCP_MIRROR_URL': 'https://mirror.openshift.com/pub/openshift-v4/clients/ocp', 'IPV6_LAB_SNO_OCP_VERSION': 'latest-4.14', 'IPV6_LAB_SNO_SERVICE_NETWORK': 'fd00:abcd:abcd:fc03::/112', 'IPV6_LAB_SSH_PUB_KEY': '/home/zuul/.ssh/id_rsa.pub', 'IPV6_LAB_WORK_DIR': '/home/zuul/.ipv6lab', 'IRONIC': 'config/samples/ironic_v1beta1_ironic.yaml', 'IRONICAPI_DEPL_IMG': 'unused', 'IRONICCON_DEPL_IMG': 'unused', 'IRONICINS_DEPL_IMG': 'unused', 'IRONICNAG_DEPL_IMG': 'unused', 'IRONICPXE_DEPL_IMG': 'unused', 'IRONIC_BRANCH': 'main', 'IRONIC_COMMIT_HASH': '', 'IRONIC_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml', 'IRONIC_IMAGE_TAG': 'release-24.1', 'IRONIC_IMG': 'quay.io/openstack-k8s-operators/ironic-operator-index:latest', 'IRONIC_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml', 'IRONIC_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests', 'IRONIC_KUTTL_NAMESPACE': 'ironic-kuttl-tests', 'IRONIC_REPO': 'https://github.com/openstack-k8s-operators/ironic-operator.git', 'KEYSTONEAPI': 'config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_DEPL_IMG': 'unused', 'KEYSTONE_BRANCH': 'main', 'KEYSTONE_COMMIT_HASH': '', 'KEYSTONE_FEDERATION_CLIENT_SECRET': 'COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f', 'KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE': 'openstack', 'KEYSTONE_IMG': 'quay.io/openstack-k8s-operators/keystone-operator-index:latest', 'KEYSTONE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml', 'KEYSTONE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests', 'KEYSTONE_KUTTL_NAMESPACE': 'keystone-kuttl-tests', 'KEYSTONE_REPO': 'https://github.com/openstack-k8s-operators/keystone-operator.git', 'KUBEADMIN_PWD': '12345678', 'LIBVIRT_SECRET': 'libvirt-secret', 'LOKI_DEPLOY_MODE': 'openshift-network', 'LOKI_DEPLOY_NAMESPACE': 'netobserv', 'LOKI_DEPLOY_SIZE': '1x.demo', 'LOKI_NAMESPACE': 'openshift-operators-redhat', 'LOKI_OPERATOR_GROUP': 'openshift-operators-redhat-loki', 'LOKI_SUBSCRIPTION': 'loki-operator', 'LVMS_CR': '1', 'MANILA': 'config/samples/manila_v1beta1_manila.yaml', 'MANILAAPI_DEPL_IMG': 'unused', 'MANILASCH_DEPL_IMG': 'unused', 'MANILASHARE_DEPL_IMG': 'unused', 'MANILA_BRANCH': 'main', 'MANILA_COMMIT_HASH': '', 'MANILA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml', 'MANILA_IMG': 'quay.io/openstack-k8s-operators/manila-operator-index:latest', 'MANILA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml', 'MANILA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests', 'MANILA_KUTTL_NAMESPACE': 'manila-kuttl-tests', 'MANILA_REPO': 'https://github.com/openstack-k8s-operators/manila-operator.git', 'MANILA_SERVICE_ENABLED': 'true', 'MARIADB': 'config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_BRANCH': 'main', 'MARIADB_CHAINSAW_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml', 'MARIADB_CHAINSAW_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests', 'MARIADB_CHAINSAW_NAMESPACE': 'mariadb-chainsaw-tests', 'MARIADB_COMMIT_HASH': '', 'MARIADB_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_DEPL_IMG': 'unused', 'MARIADB_IMG': 'quay.io/openstack-k8s-operators/mariadb-operator-index:latest', 'MARIADB_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml', 'MARIADB_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests', 'MARIADB_KUTTL_NAMESPACE': 'mariadb-kuttl-tests', 'MARIADB_REPO': 'https://github.com/openstack-k8s-operators/mariadb-operator.git', 'MEMCACHED': 'config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_DEPL_IMG': 'unused', 'METADATA_SHARED_SECRET': '1234567842', 'METALLB_IPV6_POOL': 'fd00:aaaa::80-fd00:aaaa::90', 'METALLB_POOL': '192.168.122.80-192.168.122.90', 'MICROSHIFT': '0', 'NAMESPACE': 'openstack', 'NETCONFIG': 'config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_DEPL_IMG': 'unused', 'NETOBSERV_DEPLOY_NAMESPACE': 'netobserv', 'NETOBSERV_NAMESPACE': 'openshift-netobserv-operator', 'NETOBSERV_OPERATOR_GROUP': 'openshift-netobserv-operator-net', 'NETOBSERV_SUBSCRIPTION': 'netobserv-operator', 'NETWORK_BGP': 'false', 'NETWORK_DESIGNATE_ADDRESS_PREFIX': '172.28.0', 'NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX': '172.50.0', 'NETWORK_INTERNALAPI_ADDRESS_PREFIX': '172.17.0', 'NETWORK_ISOLATION': 'true', 'NETWORK_ISOLATION_INSTANCE_NAME': 'crc', 'NETWORK_ISOLATION_IPV4': 'true', 'NETWORK_ISOLATION_IPV4_ADDRESS': '172.16.1.1/24', 'NETWORK_ISOLATION_IPV4_NAT': 'true', 'NETWORK_ISOLATION_IPV6': 'false', 'NETWORK_ISOLATION_IPV6_ADDRESS': 'fd00:aaaa::1/64', 'NETWORK_ISOLATION_IP_ADDRESS': '192.168.122.10', 'NETWORK_ISOLATION_MAC': '52:54:00:11:11:10', 'NETWORK_ISOLATION_NETWORK_NAME': 'net-iso', 'NETWORK_ISOLATION_NET_NAME': 'default', 'NETWORK_ISOLATION_USE_DEFAULT_NETWORK': 'true', 'NETWORK_MTU': '1500', 'NETWORK_STORAGEMGMT_ADDRESS_PREFIX': '172.20.0', 'NETWORK_STORAGE_ADDRESS_PREFIX': '172.18.0', 'NETWORK_STORAGE_MACVLAN': '', 'NETWORK_TENANT_ADDRESS_PREFIX': '172.19.0', 'NETWORK_VLAN_START': '20', 'NETWORK_VLAN_STEP': '1', 'NEUTRONAPI': 'config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_DEPL_IMG': 'unused', 'NEUTRON_BRANCH': 'main', 'NEUTRON_COMMIT_HASH': '', 'NEUTRON_IMG': 'quay.io/openstack-k8s-operators/neutron-operator-index:latest', 'NEUTRON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml', 'NEUTRON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests', 'NEUTRON_KUTTL_NAMESPACE': 'neutron-kuttl-tests', 'NEUTRON_REPO': 'https://github.com/openstack-k8s-operators/neutron-operator.git', 'NFS_HOME': '/home/nfs', 'NMSTATE_NAMESPACE': 'openshift-nmstate', 'NMSTATE_OPERATOR_GROUP': 'openshift-nmstate-tn6k8', 'NMSTATE_SUBSCRIPTION': 'kubernetes-nmstate-operator', 'NNCP_ADDITIONAL_HOST_ROUTES': '', 'NNCP_BGP_1_INTERFACE': 'enp7s0', 'NNCP_BGP_1_IP_ADDRESS': '100.65.4.2', 'NNCP_BGP_2_INTERFACE': 'enp8s0', 'NNCP_BGP_2_IP_ADDRESS': '100.64.4.2', 'NNCP_BRIDGE': 'ospbr', 'NNCP_CLEANUP_TIMEOUT': '120s', 'NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX': 'fd00:aaaa::', 'NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX': '10', 'NNCP_CTLPLANE_IP_ADDRESS_PREFIX': '192.168.122', 'NNCP_CTLPLANE_IP_ADDRESS_SUFFIX': '10', 'NNCP_DNS_SERVER': '192.168.122.1', 'NNCP_DNS_SERVER_IPV6': 'fd00:aaaa::1', 'NNCP_GATEWAY': '192.168.122.1', 'NNCP_GATEWAY_IPV6': 'fd00:aaaa::1', 'NNCP_INTERFACE': 'enp6s0', 'NNCP_NODES': '', 'NNCP_TIMEOUT': '240s', 'NOVA': 'config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_BRANCH': 'main', 'NOVA_COMMIT_HASH': '', 'NOVA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_IMG': 'quay.io/openstack-k8s-operators/nova-operator-index:latest', 'NOVA_REPO': 'https://github.com/openstack-k8s-operators/nova-operator.git', 'NUMBER_OF_INSTANCES': '1', 'OCP_NETWORK_NAME': 'crc', 'OCTAVIA': 'config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_BRANCH': 'main', 'OCTAVIA_COMMIT_HASH': '', 'OCTAVIA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_IMG': 'quay.io/openstack-k8s-operators/octavia-operator-index:latest', 'OCTAVIA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml', 'OCTAVIA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests', 'OCTAVIA_KUTTL_NAMESPACE': 'octavia-kuttl-tests', 'OCTAVIA_REPO': 'https://github.com/openstack-k8s-operators/octavia-operator.git', 'OKD': 'false', 'OPENSTACK_BRANCH': 'main', 'OPENSTACK_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-bundle:latest', 'OPENSTACK_COMMIT_HASH': '', 'OPENSTACK_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_CRDS_DIR': 'openstack_crds', 'OPENSTACK_CTLPLANE': 'config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-index:latest', 'OPENSTACK_K8S_BRANCH': 'main', 'OPENSTACK_K8S_TAG': 'latest', 'OPENSTACK_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml', 'OPENSTACK_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests', 'OPENSTACK_KUTTL_NAMESPACE': 'openstack-kuttl-tests', 'OPENSTACK_NEUTRON_CUSTOM_CONF': '', 'OPENSTACK_REPO': 'https://github.com/openstack-k8s-operators/openstack-operator.git', 'OPENSTACK_STORAGE_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest', 'OPERATOR_BASE_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator', 'OPERATOR_CHANNEL': '', 'OPERATOR_NAMESPACE': 'openstack-operators', 'OPERATOR_SOURCE': '', 'OPERATOR_SOURCE_NAMESPACE': '', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'OVNCONTROLLER': 'config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_NMAP': 'true', 'OVNDBS': 'config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNDBS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNNORTHD': 'config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVNNORTHD_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVN_BRANCH': 'main', 'OVN_COMMIT_HASH': '', 'OVN_IMG': 'quay.io/openstack-k8s-operators/ovn-operator-index:latest', 'OVN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml', 'OVN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests', 'OVN_KUTTL_NAMESPACE': 'ovn-kuttl-tests', 'OVN_REPO': 'https://github.com/openstack-k8s-operators/ovn-operator.git', 'PASSWORD': '12345678', 'PLACEMENTAPI': 'config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_DEPL_IMG': 'unused', 'PLACEMENT_BRANCH': 'main', 'PLACEMENT_COMMIT_HASH': '', 'PLACEMENT_IMG': 'quay.io/openstack-k8s-operators/placement-operator-index:latest', 'PLACEMENT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml', 'PLACEMENT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests', 'PLACEMENT_KUTTL_NAMESPACE': 'placement-kuttl-tests', 'PLACEMENT_REPO': 'https://github.com/openstack-k8s-operators/placement-operator.git', 'PULL_SECRET': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt', 'RABBITMQ': 'docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_BRANCH': 'patches', 'RABBITMQ_COMMIT_HASH': '', 'RABBITMQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_DEPL_IMG': 'unused', 'RABBITMQ_IMG': 'quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest', 'RABBITMQ_REPO': 'https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git', 'REDHAT_OPERATORS': 'false', 'REDIS': 'config/samples/redis_v1beta1_redis.yaml', 'REDIS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml', 'REDIS_DEPL_IMG': 'unused', 'RH_REGISTRY_PWD': '', 'RH_REGISTRY_USER': '', 'SECRET': 'osp-secret', 'SG_CORE_DEPL_IMG': 'unused', 'STANDALONE_COMPUTE_DRIVER': 'libvirt', 'STANDALONE_EXTERNAL_NET_PREFFIX': '172.21.0', 'STANDALONE_INTERNALAPI_NET_PREFIX': '172.17.0', 'STANDALONE_STORAGEMGMT_NET_PREFIX': '172.20.0', 'STANDALONE_STORAGE_NET_PREFIX': '172.18.0', 'STANDALONE_TENANT_NET_PREFIX': '172.19.0', 'STORAGEMGMT_HOST_ROUTES': '', 'STORAGE_CLASS': 'local-storage', 'STORAGE_HOST_ROUTES': '', 'SWIFT': 'config/samples/swift_v1beta1_swift.yaml', 'SWIFT_BRANCH': 'main', 'SWIFT_COMMIT_HASH': '', 'SWIFT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml', 'SWIFT_IMG': 'quay.io/openstack-k8s-operators/swift-operator-index:latest', 'SWIFT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml', 'SWIFT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests', 'SWIFT_KUTTL_NAMESPACE': 'swift-kuttl-tests', 'SWIFT_REPO': 'https://github.com/openstack-k8s-operators/swift-operator.git', 'TELEMETRY': 'config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_BRANCH': 'main', 'TELEMETRY_COMMIT_HASH': '', 'TELEMETRY_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_IMG': 'quay.io/openstack-k8s-operators/telemetry-operator-index:latest', 'TELEMETRY_KUTTL_BASEDIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator', 'TELEMETRY_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml', 'TELEMETRY_KUTTL_NAMESPACE': 'telemetry-kuttl-tests', 'TELEMETRY_KUTTL_RELPATH': 'tests/kuttl/suites', 'TELEMETRY_REPO': 'https://github.com/openstack-k8s-operators/telemetry-operator.git', 'TENANT_HOST_ROUTES': '', 'TIMEOUT': '300s', 'TLS_ENABLED': 'false', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'tripleo_deploy': 'export REGISTRY_PWD:'}}) 2025-10-02 12:06:51,302 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_install_yamls_environment', 'value': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}}) 2025-10-02 12:06:51,307 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_context', 'value': 'default/api-crc-testing:6443/kubeadmin'}) 2025-10-02 12:06:51,312 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_api', 'value': 'https://api.crc.testing:6443'}) 2025-10-02 12:06:51,317 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_cert_login', 'value': False}) 2025-10-02 12:06:51,322 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_context', 'value': 'default/api-crc-testing:6443/kubeadmin'}) 2025-10-02 12:06:51,327 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_kubeconfig', 'value': '/home/zuul/.crc/machines/crc/kubeconfig'}) 2025-10-02 12:06:51,332 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_password', 'value': 123456789}) 2025-10-02 12:06:51,338 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_token', 'value': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4'}) 2025-10-02 12:06:51,343 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_login_user', 'value': 'kubeadmin'}) 2025-10-02 12:06:51,347 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_token', 'value': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4'}) 2025-10-02 12:06:51,352 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_path', 'value': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin'}) 2025-10-02 12:06:51,356 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_commit_hash', 'value': None}) 2025-10-02 12:06:51,361 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_distro_hash', 'value': None}) 2025-10-02 12:06:51,366 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_dlrn_api_url', 'value': 'https://trunk.rdoproject.org/api-centos9-antelope'}) 2025-10-02 12:06:51,372 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_dlrn_url', 'value': 'https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5'}) 2025-10-02 12:06:51,377 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_extended_hash', 'value': None}) 2025-10-02 12:06:51,383 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_full_hash', 'value': 'a0eac564d779a7eaac46c9816bff261a'}) 2025-10-02 12:06:51,389 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_release', 'value': 'antelope'}) 2025-10-02 12:06:51,394 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'discovered_interpreter_python', 'value': '/usr/bin/python3'}) 2025-10-02 12:06:51,399 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'gather_subset', 'value': ['all']}) 2025-10-02 12:06:51,404 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'module_setup', 'value': True}) 2025-10-02 12:06:51,414 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_secret_name', 'value': 'test-operator-controller-priv-key'}) 2025-10-02 12:06:51,424 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_file_path', 'value': '~/.ssh/id_cifw'}) 2025-10-02 12:06:51,435 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_kind_name', 'value': 'Tempest'}) 2025-10-02 12:06:51,445 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kind_name', 'value': 'Tobiko'}) 2025-10-02 12:06:51,456 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_kind_name', 'value': 'AnsibleTest'}) 2025-10-02 12:06:51,466 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_kind_name', 'value': 'HorizonTest'}) 2025-10-02 12:06:51,476 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crd_group', 'value': 'test.openstack.org'}) 2025-10-02 12:06:51,487 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_crd_name', 'value': 'tempests.{{ cifmw_test_operator_crd_group }}'}) 2025-10-02 12:06:51,498 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_crd_name', 'value': 'tobikoes.{{ cifmw_test_operator_crd_group }}'}) 2025-10-02 12:06:51,510 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_crd_name', 'value': 'ansibletests.{{ cifmw_test_operator_crd_group }}'}) 2025-10-02 12:06:51,521 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_crd_name', 'value': 'horizontests.{{ cifmw_test_operator_crd_group }}'}) 2025-10-02 12:06:51,532 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_name', 'value': 'test-operator-controller-manager'}) 2025-10-02 12:06:51,544 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_default_conf', 'value': {'DEFAULT': {'log_dir': '/var/lib/tobiko/tobiko', 'log_file': 'tobiko.log', 'debug': True}, 'testcase': {'timeout': 1800.0, 'test_runner_timeout': 14400.0}, 'ubuntu': {'interface_name': 'enp3s0', 'customized_image_provided': 'True', 'image_url': '{{ cifmw_test_operator_tobiko_advanced_image_url }}'}, 'keystone': {'interface': 'public'}, 'manila': {'share_protocol': 'cephfs'}}}) 2025-10-02 12:06:51,549 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pre_tests', 'value': "{{ (lookup('vars', 'pre_tempest', default=[])) }}"}) 2025-10-02 12:06:51,553 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'post_tests', 'value': "{{ (lookup('vars', 'post_tempest', default=[])) }}"}) 2025-10-02 12:06:51,557 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': '_stage_vars', 'value': {'name': 'tempest', 'type': 'tempest'}}) 2025-10-02 12:06:51,562 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': '_ansible_item_label', 'value': {'name': 'tempest', 'type': 'tempest'}}) 2025-10-02 12:06:51,567 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'start_with', 'value': 'cifmw_test_operator_'}) 2025-10-02 12:06:51,572 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_basedir', 'value': '{{ ansible_user_dir }}/ci-framework-data'}) 2025-10-02 12:06:51,578 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_config_certmanager', 'value': True}) 2025-10-02 12:06:51,582 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_deploy_edpm', 'value': True}) 2025-10-02 12:06:51,587 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_edpm_prepare_kustomizations', 'value': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}]}) 2025-10-02 12:06:51,592 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_edpm_prepare_skip_crc_storage_creation', 'value': True}) 2025-10-02 12:06:51,598 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_edpm_prepare_timeout', 'value': 60}) 2025-10-02 12:06:51,603 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_installyamls_repos', 'value': '{{ ansible_user_dir }}/src/github.com/openstack-k8s-operators/install_yamls'}) 2025-10-02 12:06:51,608 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_setup_skip_internal_registry', 'value': True}) 2025-10-02 12:06:51,613 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_openshift_setup_skip_internal_registry_tls_verify', 'value': True}) 2025-10-02 12:06:51,617 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_operator_build_meta_name', 'value': 'openstack-operator'}) 2025-10-02 12:06:51,622 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_dist_major_version', 'value': 9}) 2025-10-02 12:06:51,626 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_repo_setup_os_release', 'value': 'centos'}) 2025-10-02 12:06:51,631 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_run_test_role', 'value': 'test_operator'}) 2025-10-02 12:06:51,636 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_run_tests', 'value': True}) 2025-10-02 12:06:51,646 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_exclude_list', 'value': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n'}) 2025-10-02 12:06:51,655 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_include_list', 'value': 'watcher_tempest_plugin.*\n'}) 2025-10-02 12:06:51,669 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tempestconf_config', 'value': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}}) 2025-10-02 12:06:51,673 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_update_containers', 'value': True}) 2025-10-02 12:06:51,678 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_use_crc', 'value': False}) 2025-10-02 12:06:51,683 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'post_ctlplane_deploy', 'value': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}]}) 2025-10-02 12:06:51,689 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'post_deploy', 'value': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '{{ prometheus_admin_api_hook }}'}]}) 2025-10-02 12:06:51,695 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'post_infra', 'value': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '{{ ansible_user_dir }}/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}]}) 2025-10-02 12:06:51,701 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pre_deploy', 'value': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}]}) 2025-10-02 12:06:51,709 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pre_deploy_create_coo_subscription', 'value': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '{{ watcher_coo_hook }}'}]}) 2025-10-02 12:06:51,714 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pre_infra', 'value': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '{{ cifmw_installyamls_repos }}/devsetup/download_tools.yaml'}]}) 2025-10-02 12:06:51,720 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pre_update', 'value': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '{{ ansible_user_dir }}/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}]}) 2025-10-02 12:06:51,726 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': '_stage_var_file', 'value': {}}) 2025-10-02 12:06:51,733 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'csv_info', 'value': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}}) 2025-10-02 12:06:51,738 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'image_index', 'value': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}}) 2025-10-02 12:06:51,744 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pod_info', 'value': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}}) 2025-10-02 12:06:51,749 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'pod_list', 'value': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}}) 2025-10-02 12:06:51,754 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'stage_vars_dict', 'value': {}}) 2025-10-02 12:06:51,760 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': '_stage_test_vars', 'value': {}}) 2025-10-02 12:06:51,766 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_parent_role_names', 'value': ['cifmw_setup']}) 2025-10-02 12:06:51,771 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_parent_role_paths', 'value': ['/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_setup']}) 2025-10-02 12:06:51,777 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_install_yamls_vars', 'value': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}}) 2025-10-02 12:06:51,783 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'watcher_repo', 'value': '{{ ansible_user_dir }}/src/github.com/openstack-k8s-operators/watcher-operator'}) 2025-10-02 12:06:51,789 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'watcher_coo_hook', 'value': '{{ watcher_repo }}/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2025-10-02 12:06:51,794 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'prometheus_admin_api_hook', 'value': '{{ watcher_repo }}/ci/playbooks/prometheus_admin_api.yaml'}) 2025-10-02 12:06:51,799 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'cifmw_install_yamls_whitelisted_vars', 'value': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR']}) 2025-10-02 12:06:51,805 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'run_tempest', 'value': False}) 2025-10-02 12:06:51,811 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'playbook_dir', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework'}) 2025-10-02 12:06:51,817 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_playbook_python', 'value': '/usr/bin/python3'}) 2025-10-02 12:06:51,823 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_config_file', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg'}) 2025-10-02 12:06:51,829 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_role_names', 'value': ['cifmw_setup', 'compliance', 'run_hook', 'os_net_setup', 'test_operator']}) 2025-10-02 12:06:51,835 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_play_role_names', 'value': ['run_hook', 'os_net_setup', 'run_hook', 'cifmw_setup', 'run_hook', 'test_operator', 'run_hook', 'cifmw_setup', 'compliance', 'run_hook', 'run_hook']}) 2025-10-02 12:06:51,840 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_dependent_role_names', 'value': []}) 2025-10-02 12:06:51,846 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'role_names', 'value': ['run_hook', 'os_net_setup', 'run_hook', 'cifmw_setup', 'run_hook', 'test_operator', 'run_hook', 'cifmw_setup', 'compliance', 'run_hook', 'run_hook']}) 2025-10-02 12:06:51,852 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_play_name', 'value': 'Run Post-deployment admin setup steps, test, and compliance scan'}) 2025-10-02 12:06:51,857 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'role_name', 'value': 'test_operator'}) 2025-10-02 12:06:51,862 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'role_path', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator'}) 2025-10-02 12:06:51,868 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'role_uuid', 'value': 'fa163ed0-d11d-27c3-0a0c-0000000000ff'}) 2025-10-02 12:06:51,873 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_collection_name', 'value': None}) 2025-10-02 12:06:51,878 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_role_name', 'value': 'test_operator'}) 2025-10-02 12:06:51,884 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'groups', 'value': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}}) 2025-10-02 12:06:51,889 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_play_hosts_all', 'value': ['localhost']}) 2025-10-02 12:06:51,895 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_play_hosts', 'value': ['localhost']}) 2025-10-02 12:06:51,900 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_play_batch', 'value': ['localhost']}) 2025-10-02 12:06:51,905 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'play_hosts', 'value': ['localhost']}) 2025-10-02 12:06:51,910 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'omit', 'value': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef'}) 2025-10-02 12:06:51,916 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_version', 'value': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}}) 2025-10-02 12:06:51,922 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_check_mode', 'value': False}) 2025-10-02 12:06:51,929 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_diff_mode', 'value': False}) 2025-10-02 12:06:51,935 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_forks', 'value': 5}) 2025-10-02 12:06:51,940 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_inventory_sources', 'value': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml']}) 2025-10-02 12:06:51,945 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_skip_tags', 'value': []}) 2025-10-02 12:06:51,951 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_run_tags', 'value': ['all']}) 2025-10-02 12:06:51,956 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'ansible_verbosity', 'value': 0}) 2025-10-02 12:06:52,053 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'hostvars', 'value': {'compute-0': {'cifmw_artifacts_crc_sshkey': '~/.ssh/id_cifw', 'cifmw_build_images_output': {}, 'cifmw_dlrn_report_result': False, 'cifmw_edpm_telemetry_enabled_exporters': ['podman_exporter', 'openstack_network_exporter'], 'cifmw_extras': ['@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml'], 'cifmw_openshift_api': 'api.crc.testing:6443', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_password': '123456789', 'cifmw_openshift_skip_tls_verify': True, 'cifmw_openshift_user': 'kubeadmin', 'cifmw_operator_build_output': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}, 'cifmw_test_operator_tempest_external_plugin': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}], 'cifmw_test_operator_tempest_image_tag': 'watcher_latest', 'cifmw_test_operator_tempest_namespace': 'podified-epoxy-centos9', 'cifmw_test_operator_tempest_registry': '38.129.56.134:5001', 'cifmw_update_containers_openstack': False, 'cifmw_update_containers_org': 'podified-epoxy-centos9', 'cifmw_update_containers_registry': '38.129.56.134:5001', 'cifmw_update_containers_tag': 'watcher_latest', 'cifmw_update_containers_watcher': True, 'cifmw_use_libvirt': False, 'cifmw_zuul_target_host': 'controller', 'content_provider_dlrn_md5_hash': '', 'content_provider_os_registry_url': '38.129.56.134:5001/podified-epoxy-centos9', 'content_provider_registry_ip': '38.129.56.134', 'crc_ci_bootstrap_cloud_name': 'vexxhost', 'crc_ci_bootstrap_networking': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': 1500, 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}, 'enable_ramdisk': True, 'fetch_dlrn_hash': False, 'push_registry': 'quay.rdoproject.org', 'quay_login_secret_name': 'quay_nextgen_zuulgithubci', 'registry_login_enabled': True, 'watcher_scenario': 'edpm-no-notifications', 'watcher_services_tag': 'watcher_latest', 'watcher_tempest_max_microversion': '1.4', 'zuul': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}, 'zuul_log_collection': False, 'inventory_file': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'inventory_dir': '/home/zuul/ci-framework-data/artifacts', 'ansible_connection': 'ssh', 'ansible_host': '38.102.83.156', 'ansible_port': 22, 'ansible_python_interpreter': 'auto', 'ansible_user': 'zuul', 'nodepool': {'az': 'nova', 'cloud': 'vexxhost-nodepool-tripleo', 'external_id': '40756518-2ad4-41de-8f41-71367c9cc75a', 'host_id': '4d5af5c3d4216850e4ad6b0187cc3c64a31e016b0c19899ec067977a', 'interface_ip': '38.102.83.156', 'label': 'cloud-centos-9-stream-tripleo', 'private_ipv4': '38.102.83.156', 'private_ipv6': None, 'provider': 'vexxhost-nodepool-tripleo', 'public_ipv4': '38.102.83.156', 'public_ipv6': '', 'region': 'RegionOne', 'slot': None}, 'inventory_hostname': 'compute-0', 'inventory_hostname_short': 'compute-0', 'group_names': ['computes'], 'ansible_facts': {'all_ipv4_addresses': ['192.168.122.100', '38.102.83.156'], 'all_ipv6_addresses': ['fe80::f816:3eff:fe58:d542'], 'apparmor': {'status': 'disabled'}, 'architecture': 'x86_64', 'bios_date': '04/01/2014', 'bios_vendor': 'SeaBIOS', 'bios_version': '1.15.0-1', 'board_asset_tag': 'NA', 'board_name': 'NA', 'board_serial': 'NA', 'board_vendor': 'NA', 'board_version': 'NA', 'chassis_asset_tag': 'NA', 'chassis_serial': 'NA', 'chassis_vendor': 'QEMU', 'chassis_version': 'pc-i440fx-6.2', 'cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404555', 'epoch_int': '1759404555', 'hour': '11', 'iso8601': '2025-10-02T11:29:15Z', 'iso8601_basic': '20251002T112915735153', 'iso8601_basic_short': '20251002T112915', 'iso8601_micro': '2025-10-02T11:29:15.735153Z', 'minute': '29', 'month': '10', 'second': '15', 'time': '11:29:15', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'default_ipv4': {'address': '38.102.83.156', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:58:d5:42', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'default_ipv6': {}, 'device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-44-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-44-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '167770079', 'sectorsize': 512, 'size': '80.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '167772160', 'sectorsize': '512', 'size': '80.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'distribution': 'CentOS', 'distribution_file_parsed': True, 'distribution_file_path': '/etc/centos-release', 'distribution_file_variety': 'CentOS', 'distribution_major_version': '9', 'distribution_release': 'Stream', 'distribution_version': '9', 'dns': {'nameservers': ['199.204.44.24', '199.204.47.54']}, 'domain': '', 'effective_group_id': 1000, 'effective_user_id': 1000, 'env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '1', 'SSH_CLIENT': '38.102.83.234 58250 22', 'SSH_CONNECTION': '38.102.83.234 58250 38.102.83.156 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '7', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.156', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fe58:d542', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:58:d5:42', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.100', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:1a:91:ad', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'fibre_channel_wwn': [], 'fips': False, 'form_factor': 'Other', 'fqdn': 'compute-0', 'hostname': 'compute-0', 'hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'interfaces': ['eth0', 'eth1', 'lo'], 'is_chroot': False, 'iscsi_iqn': '', 'kernel': '5.14.0-620.el9.x86_64', 'kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'loadavg': {'15m': 0.16, '1m': 0.04, '5m': 0.25}, 'ansible_local': {}, 'locally_reachable_ips': {'ipv4': ['38.102.83.156', '127.0.0.0/8', '127.0.0.1', '192.168.122.100'], 'ipv6': ['::1', 'fe80::f816:3eff:fe58:d542']}, 'lsb': {}, 'lvm': 'N/A', 'machine': 'x86_64', 'machine_id': '42833e1b511a402df82cb9cb2fc36491', 'memfree_mb': 6846, 'memory_mb': {'nocache': {'free': 7301, 'used': 378}, 'real': {'free': 6846, 'total': 7679, 'used': 833}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'memtotal_mb': 7679, 'mounts': [{'block_available': 20340066, 'block_size': 4096, 'block_total': 20954875, 'block_used': 614809, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 41887493, 'inode_total': 41942512, 'inode_used': 55019, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 83312910336, 'size_total': 85831168000, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'nodename': 'compute-0', 'os_family': 'RedHat', 'pkg_mgr': 'dnf', 'proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '2', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '3', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '4', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '5', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '6', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '7', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'processor_cores': 1, 'processor_count': 8, 'processor_nproc': 8, 'processor_threads_per_core': 1, 'processor_vcpus': 8, 'product_name': 'OpenStack Nova', 'product_serial': 'NA', 'product_uuid': 'NA', 'product_version': '26.2.1', 'python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'python_version': '3.9.23', 'real_group_id': 1000, 'real_user_id': 1000, 'selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'selinux_python_present': True, 'service_mgr': 'systemd', 'ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFFAIlmpGn9ythjbowQgYUyNIn3KbQm4o+IHUCa+Oq1zwtT0BZ9HsUX9/LMe6igfCL03vnt9ts08sTwMbonYbtI=', 'ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIH9NTen163rrjWhXpz9nDB9WRs8vkcHISFSn1lTmYU5D', 'ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ssh_host_key_rsa_public': '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', 'ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'swapfree_mb': 0, 'swaptotal_mb': 0, 'system': 'Linux', 'system_capabilities': [''], 'system_capabilities_enforced': 'True', 'system_vendor': 'OpenStack Foundation', 'uptime_seconds': 919, 'user_dir': '/home/zuul', 'user_gecos': '', 'user_gid': 1000, 'user_id': 'zuul', 'user_shell': '/bin/bash', 'user_uid': 1000, 'userspace_architecture': 'x86_64', 'userspace_bits': '64', 'virtualization_role': 'guest', 'virtualization_tech_guest': ['openstack'], 'virtualization_tech_host': ['kvm'], 'virtualization_type': 'openstack', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True}, 'ansible_all_ipv4_addresses': ['192.168.122.100', '38.102.83.156'], 'ansible_all_ipv6_addresses': ['fe80::f816:3eff:fe58:d542'], 'ansible_apparmor': {'status': 'disabled'}, 'ansible_architecture': 'x86_64', 'ansible_bios_date': '04/01/2014', 'ansible_bios_vendor': 'SeaBIOS', 'ansible_bios_version': '1.15.0-1', 'ansible_board_asset_tag': 'NA', 'ansible_board_name': 'NA', 'ansible_board_serial': 'NA', 'ansible_board_vendor': 'NA', 'ansible_board_version': 'NA', 'ansible_chassis_asset_tag': 'NA', 'ansible_chassis_serial': 'NA', 'ansible_chassis_vendor': 'QEMU', 'ansible_chassis_version': 'pc-i440fx-6.2', 'ansible_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404555', 'epoch_int': '1759404555', 'hour': '11', 'iso8601': '2025-10-02T11:29:15Z', 'iso8601_basic': '20251002T112915735153', 'iso8601_basic_short': '20251002T112915', 'iso8601_micro': '2025-10-02T11:29:15.735153Z', 'minute': '29', 'month': '10', 'second': '15', 'time': '11:29:15', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'ansible_default_ipv4': {'address': '38.102.83.156', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:58:d5:42', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'ansible_default_ipv6': {}, 'ansible_device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-44-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'ansible_devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-44-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '167770079', 'sectorsize': 512, 'size': '80.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '167772160', 'sectorsize': '512', 'size': '80.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'ansible_distribution': 'CentOS', 'ansible_distribution_file_parsed': True, 'ansible_distribution_file_path': '/etc/centos-release', 'ansible_distribution_file_variety': 'CentOS', 'ansible_distribution_major_version': '9', 'ansible_distribution_release': 'Stream', 'ansible_distribution_version': '9', 'ansible_dns': {'nameservers': ['199.204.44.24', '199.204.47.54']}, 'ansible_domain': '', 'ansible_effective_group_id': 1000, 'ansible_effective_user_id': 1000, 'ansible_env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '1', 'SSH_CLIENT': '38.102.83.234 58250 22', 'SSH_CONNECTION': '38.102.83.234 58250 38.102.83.156 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '7', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'ansible_eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.156', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fe58:d542', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:58:d5:42', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.100', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:1a:91:ad', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_fibre_channel_wwn': [], 'ansible_fips': False, 'ansible_form_factor': 'Other', 'ansible_fqdn': 'compute-0', 'ansible_hostname': 'compute-0', 'ansible_hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'ansible_interfaces': ['eth0', 'eth1', 'lo'], 'ansible_is_chroot': False, 'ansible_iscsi_iqn': '', 'ansible_kernel': '5.14.0-620.el9.x86_64', 'ansible_kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'ansible_lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'ansible_loadavg': {'15m': 0.16, '1m': 0.04, '5m': 0.25}, 'ansible_local': {}, 'ansible_locally_reachable_ips': {'ipv4': ['38.102.83.156', '127.0.0.0/8', '127.0.0.1', '192.168.122.100'], 'ipv6': ['::1', 'fe80::f816:3eff:fe58:d542']}, 'ansible_lsb': {}, 'ansible_lvm': 'N/A', 'ansible_machine': 'x86_64', 'ansible_machine_id': '42833e1b511a402df82cb9cb2fc36491', 'ansible_memfree_mb': 6846, 'ansible_memory_mb': {'nocache': {'free': 7301, 'used': 378}, 'real': {'free': 6846, 'total': 7679, 'used': 833}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'ansible_memtotal_mb': 7679, 'ansible_mounts': [{'block_available': 20340066, 'block_size': 4096, 'block_total': 20954875, 'block_used': 614809, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 41887493, 'inode_total': 41942512, 'inode_used': 55019, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 83312910336, 'size_total': 85831168000, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'ansible_nodename': 'compute-0', 'ansible_os_family': 'RedHat', 'ansible_pkg_mgr': 'dnf', 'ansible_proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '2', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '3', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '4', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '5', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '6', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '7', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'ansible_processor_cores': 1, 'ansible_processor_count': 8, 'ansible_processor_nproc': 8, 'ansible_processor_threads_per_core': 1, 'ansible_processor_vcpus': 8, 'ansible_product_name': 'OpenStack Nova', 'ansible_product_serial': 'NA', 'ansible_product_uuid': 'NA', 'ansible_product_version': '26.2.1', 'ansible_python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'ansible_python_version': '3.9.23', 'ansible_real_group_id': 1000, 'ansible_real_user_id': 1000, 'ansible_selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'ansible_selinux_python_present': True, 'ansible_service_mgr': 'systemd', 'ansible_ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFFAIlmpGn9ythjbowQgYUyNIn3KbQm4o+IHUCa+Oq1zwtT0BZ9HsUX9/LMe6igfCL03vnt9ts08sTwMbonYbtI=', 'ansible_ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ansible_ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIH9NTen163rrjWhXpz9nDB9WRs8vkcHISFSn1lTmYU5D', 'ansible_ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ansible_ssh_host_key_rsa_public': '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', 'ansible_ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'ansible_swapfree_mb': 0, 'ansible_swaptotal_mb': 0, 'ansible_system': 'Linux', 'ansible_system_capabilities': [''], 'ansible_system_capabilities_enforced': 'True', 'ansible_system_vendor': 'OpenStack Foundation', 'ansible_uptime_seconds': 919, 'ansible_user_dir': '/home/zuul', 'ansible_user_gecos': '', 'ansible_user_gid': 1000, 'ansible_user_id': 'zuul', 'ansible_user_shell': '/bin/bash', 'ansible_user_uid': 1000, 'ansible_userspace_architecture': 'x86_64', 'ansible_userspace_bits': '64', 'ansible_virtualization_role': 'guest', 'ansible_virtualization_tech_guest': ['openstack'], 'ansible_virtualization_tech_host': ['kvm'], 'ansible_virtualization_type': 'openstack', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True, 'cifmw_repo_setup_os_release': 'centos', 'cifmw_repo_setup_dist_major_version': 9, 'cifmw_basedir': '/home/zuul/ci-framework-data', 'cifmw_installyamls_repos': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls', 'cifmw_install_yamls_vars': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}, 'cifmw_operator_build_meta_name': 'openstack-operator', 'cifmw_edpm_prepare_skip_crc_storage_creation': True, 'cifmw_deploy_edpm': True, 'cifmw_openshift_setup_skip_internal_registry': True, 'cifmw_config_certmanager': True, 'pre_infra': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}], 'post_ctlplane_deploy': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}], 'cifmw_use_crc': False, 'cifmw_openshift_setup_skip_internal_registry_tls_verify': True, 'post_infra': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'pre_update': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'cifmw_update_containers': True, 'cifmw_run_tests': True, 'cifmw_run_test_role': 'test_operator', 'cifmw_test_operator_tempest_include_list': 'watcher_tempest_plugin.*\n', 'pre_deploy': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}], 'watcher_repo': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'watcher_coo_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml', 'prometheus_admin_api_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml', 'pre_deploy_create_coo_subscription': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}], 'post_deploy': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}], 'cifmw_edpm_prepare_kustomizations': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}], 'cifmw_edpm_prepare_timeout': 60, 'cifmw_install_yamls_whitelisted_vars': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR'], 'cifmw_test_operator_tempest_tempestconf_config': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}, 'run_tempest': False, 'cifmw_test_operator_tempest_concurrency': 1, 'cifmw_test_operator_tempest_exclude_list': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n', 'playbook_dir': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'ansible_playbook_python': '/usr/bin/python3', 'ansible_config_file': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg', 'groups': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}, 'omit': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef', 'ansible_version': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}, 'ansible_check_mode': False, 'ansible_diff_mode': False, 'ansible_forks': 5, 'ansible_inventory_sources': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'], 'ansible_skip_tags': [], 'ansible_run_tags': ['all'], 'ansible_verbosity': 0}, 'compute-1': {'cifmw_artifacts_crc_sshkey': '~/.ssh/id_cifw', 'cifmw_build_images_output': {}, 'cifmw_dlrn_report_result': False, 'cifmw_edpm_telemetry_enabled_exporters': ['podman_exporter', 'openstack_network_exporter'], 'cifmw_extras': ['@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml'], 'cifmw_openshift_api': 'api.crc.testing:6443', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_password': '123456789', 'cifmw_openshift_skip_tls_verify': True, 'cifmw_openshift_user': 'kubeadmin', 'cifmw_operator_build_output': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}, 'cifmw_test_operator_tempest_external_plugin': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}], 'cifmw_test_operator_tempest_image_tag': 'watcher_latest', 'cifmw_test_operator_tempest_namespace': 'podified-epoxy-centos9', 'cifmw_test_operator_tempest_registry': '38.129.56.134:5001', 'cifmw_update_containers_openstack': False, 'cifmw_update_containers_org': 'podified-epoxy-centos9', 'cifmw_update_containers_registry': '38.129.56.134:5001', 'cifmw_update_containers_tag': 'watcher_latest', 'cifmw_update_containers_watcher': True, 'cifmw_use_libvirt': False, 'cifmw_zuul_target_host': 'controller', 'content_provider_dlrn_md5_hash': '', 'content_provider_os_registry_url': '38.129.56.134:5001/podified-epoxy-centos9', 'content_provider_registry_ip': '38.129.56.134', 'crc_ci_bootstrap_cloud_name': 'vexxhost', 'crc_ci_bootstrap_networking': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': 1500, 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}, 'enable_ramdisk': True, 'fetch_dlrn_hash': False, 'push_registry': 'quay.rdoproject.org', 'quay_login_secret_name': 'quay_nextgen_zuulgithubci', 'registry_login_enabled': True, 'watcher_scenario': 'edpm-no-notifications', 'watcher_services_tag': 'watcher_latest', 'watcher_tempest_max_microversion': '1.4', 'zuul': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}, 'zuul_log_collection': False, 'inventory_file': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'inventory_dir': '/home/zuul/ci-framework-data/artifacts', 'ansible_connection': 'ssh', 'ansible_host': '38.102.83.115', 'ansible_port': 22, 'ansible_python_interpreter': 'auto', 'ansible_user': 'zuul', 'nodepool': {'az': 'nova', 'cloud': 'vexxhost-nodepool-tripleo', 'external_id': '48f2b9bd-282e-43a4-aeba-9c2737a13b05', 'host_id': '511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b', 'interface_ip': '38.102.83.115', 'label': 'cloud-centos-9-stream-tripleo', 'private_ipv4': '38.102.83.115', 'private_ipv6': None, 'provider': 'vexxhost-nodepool-tripleo', 'public_ipv4': '38.102.83.115', 'public_ipv6': '', 'region': 'RegionOne', 'slot': None}, 'inventory_hostname': 'compute-1', 'inventory_hostname_short': 'compute-1', 'group_names': ['computes'], 'ansible_facts': {'all_ipv4_addresses': ['192.168.122.101', '38.102.83.115'], 'all_ipv6_addresses': ['fe80::f816:3eff:fed7:7c1d'], 'apparmor': {'status': 'disabled'}, 'architecture': 'x86_64', 'bios_date': '04/01/2014', 'bios_vendor': 'SeaBIOS', 'bios_version': '1.15.0-1', 'board_asset_tag': 'NA', 'board_name': 'NA', 'board_serial': 'NA', 'board_vendor': 'NA', 'board_version': 'NA', 'chassis_asset_tag': 'NA', 'chassis_serial': 'NA', 'chassis_vendor': 'QEMU', 'chassis_version': 'pc-i440fx-6.2', 'cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404555', 'epoch_int': '1759404555', 'hour': '11', 'iso8601': '2025-10-02T11:29:15Z', 'iso8601_basic': '20251002T112915634490', 'iso8601_basic_short': '20251002T112915', 'iso8601_micro': '2025-10-02T11:29:15.634490Z', 'minute': '29', 'month': '10', 'second': '15', 'time': '11:29:15', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'default_ipv4': {'address': '38.102.83.115', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d7:7c:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'default_ipv6': {}, 'device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-36-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-36-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '167770079', 'sectorsize': 512, 'size': '80.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '167772160', 'sectorsize': '512', 'size': '80.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'distribution': 'CentOS', 'distribution_file_parsed': True, 'distribution_file_path': '/etc/centos-release', 'distribution_file_variety': 'CentOS', 'distribution_major_version': '9', 'distribution_release': 'Stream', 'distribution_version': '9', 'dns': {'nameservers': ['199.204.44.24', '199.204.47.54']}, 'domain': '', 'effective_group_id': 1000, 'effective_user_id': 1000, 'env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '1', 'SSH_CLIENT': '38.102.83.234 60708 22', 'SSH_CONNECTION': '38.102.83.234 60708 38.102.83.115 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '6', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.115', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed7:7c1d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d7:7c:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.101', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f3:e8:5e', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'fibre_channel_wwn': [], 'fips': False, 'form_factor': 'Other', 'fqdn': 'compute-1', 'hostname': 'compute-1', 'hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'interfaces': ['eth0', 'eth1', 'lo'], 'is_chroot': False, 'iscsi_iqn': '', 'kernel': '5.14.0-620.el9.x86_64', 'kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'loadavg': {'15m': 0.19, '1m': 0.11, '5m': 0.29}, 'ansible_local': {}, 'locally_reachable_ips': {'ipv4': ['38.102.83.115', '127.0.0.0/8', '127.0.0.1', '192.168.122.101'], 'ipv6': ['::1', 'fe80::f816:3eff:fed7:7c1d']}, 'lsb': {}, 'lvm': 'N/A', 'machine': 'x86_64', 'machine_id': '42833e1b511a402df82cb9cb2fc36491', 'memfree_mb': 6843, 'memory_mb': {'nocache': {'free': 7298, 'used': 381}, 'real': {'free': 6843, 'total': 7679, 'used': 836}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'memtotal_mb': 7679, 'mounts': [{'block_available': 20340055, 'block_size': 4096, 'block_total': 20954875, 'block_used': 614820, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 41887493, 'inode_total': 41942512, 'inode_used': 55019, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 83312865280, 'size_total': 85831168000, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'nodename': 'compute-1', 'os_family': 'RedHat', 'pkg_mgr': 'dnf', 'proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '2', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '3', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '4', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '5', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '6', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '7', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'processor_cores': 1, 'processor_count': 8, 'processor_nproc': 8, 'processor_threads_per_core': 1, 'processor_vcpus': 8, 'product_name': 'OpenStack Nova', 'product_serial': 'NA', 'product_uuid': 'NA', 'product_version': '26.2.1', 'python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'python_version': '3.9.23', 'real_group_id': 1000, 'real_user_id': 1000, 'selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'selinux_python_present': True, 'service_mgr': 'systemd', 'ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP5lfWZRPolKil+6X2YhLijl9ubFP3nZQ3jftEDv0/73cxkVvyezN+nEC9eCz1rR3jn64HmoyM6oZyClHwdIiN8=', 'ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIJ3h1iXdWynOCXWRSw+AD/JU3w4PiEUdFkE1hNb6+9TO', 'ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ssh_host_key_rsa_public': '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', 'ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'swapfree_mb': 0, 'swaptotal_mb': 0, 'system': 'Linux', 'system_capabilities': [''], 'system_capabilities_enforced': 'True', 'system_vendor': 'OpenStack Foundation', 'uptime_seconds': 925, 'user_dir': '/home/zuul', 'user_gecos': '', 'user_gid': 1000, 'user_id': 'zuul', 'user_shell': '/bin/bash', 'user_uid': 1000, 'userspace_architecture': 'x86_64', 'userspace_bits': '64', 'virtualization_role': 'guest', 'virtualization_tech_guest': ['openstack'], 'virtualization_tech_host': ['kvm'], 'virtualization_type': 'openstack', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True}, 'ansible_all_ipv4_addresses': ['192.168.122.101', '38.102.83.115'], 'ansible_all_ipv6_addresses': ['fe80::f816:3eff:fed7:7c1d'], 'ansible_apparmor': {'status': 'disabled'}, 'ansible_architecture': 'x86_64', 'ansible_bios_date': '04/01/2014', 'ansible_bios_vendor': 'SeaBIOS', 'ansible_bios_version': '1.15.0-1', 'ansible_board_asset_tag': 'NA', 'ansible_board_name': 'NA', 'ansible_board_serial': 'NA', 'ansible_board_vendor': 'NA', 'ansible_board_version': 'NA', 'ansible_chassis_asset_tag': 'NA', 'ansible_chassis_serial': 'NA', 'ansible_chassis_vendor': 'QEMU', 'ansible_chassis_version': 'pc-i440fx-6.2', 'ansible_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404555', 'epoch_int': '1759404555', 'hour': '11', 'iso8601': '2025-10-02T11:29:15Z', 'iso8601_basic': '20251002T112915634490', 'iso8601_basic_short': '20251002T112915', 'iso8601_micro': '2025-10-02T11:29:15.634490Z', 'minute': '29', 'month': '10', 'second': '15', 'time': '11:29:15', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'ansible_default_ipv4': {'address': '38.102.83.115', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d7:7c:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'ansible_default_ipv6': {}, 'ansible_device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-36-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'ansible_devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-36-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '167770079', 'sectorsize': 512, 'size': '80.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '167772160', 'sectorsize': '512', 'size': '80.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'ansible_distribution': 'CentOS', 'ansible_distribution_file_parsed': True, 'ansible_distribution_file_path': '/etc/centos-release', 'ansible_distribution_file_variety': 'CentOS', 'ansible_distribution_major_version': '9', 'ansible_distribution_release': 'Stream', 'ansible_distribution_version': '9', 'ansible_dns': {'nameservers': ['199.204.44.24', '199.204.47.54']}, 'ansible_domain': '', 'ansible_effective_group_id': 1000, 'ansible_effective_user_id': 1000, 'ansible_env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '1', 'SSH_CLIENT': '38.102.83.234 60708 22', 'SSH_CONNECTION': '38.102.83.234 60708 38.102.83.115 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '6', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'ansible_eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.115', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed7:7c1d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d7:7c:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.101', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f3:e8:5e', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_fibre_channel_wwn': [], 'ansible_fips': False, 'ansible_form_factor': 'Other', 'ansible_fqdn': 'compute-1', 'ansible_hostname': 'compute-1', 'ansible_hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'ansible_interfaces': ['eth0', 'eth1', 'lo'], 'ansible_is_chroot': False, 'ansible_iscsi_iqn': '', 'ansible_kernel': '5.14.0-620.el9.x86_64', 'ansible_kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'ansible_lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'ansible_loadavg': {'15m': 0.19, '1m': 0.11, '5m': 0.29}, 'ansible_local': {}, 'ansible_locally_reachable_ips': {'ipv4': ['38.102.83.115', '127.0.0.0/8', '127.0.0.1', '192.168.122.101'], 'ipv6': ['::1', 'fe80::f816:3eff:fed7:7c1d']}, 'ansible_lsb': {}, 'ansible_lvm': 'N/A', 'ansible_machine': 'x86_64', 'ansible_machine_id': '42833e1b511a402df82cb9cb2fc36491', 'ansible_memfree_mb': 6843, 'ansible_memory_mb': {'nocache': {'free': 7298, 'used': 381}, 'real': {'free': 6843, 'total': 7679, 'used': 836}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'ansible_memtotal_mb': 7679, 'ansible_mounts': [{'block_available': 20340055, 'block_size': 4096, 'block_total': 20954875, 'block_used': 614820, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 41887493, 'inode_total': 41942512, 'inode_used': 55019, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 83312865280, 'size_total': 85831168000, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'ansible_nodename': 'compute-1', 'ansible_os_family': 'RedHat', 'ansible_pkg_mgr': 'dnf', 'ansible_proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '2', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '3', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '4', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '5', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '6', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '7', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'ansible_processor_cores': 1, 'ansible_processor_count': 8, 'ansible_processor_nproc': 8, 'ansible_processor_threads_per_core': 1, 'ansible_processor_vcpus': 8, 'ansible_product_name': 'OpenStack Nova', 'ansible_product_serial': 'NA', 'ansible_product_uuid': 'NA', 'ansible_product_version': '26.2.1', 'ansible_python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'ansible_python_version': '3.9.23', 'ansible_real_group_id': 1000, 'ansible_real_user_id': 1000, 'ansible_selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'ansible_selinux_python_present': True, 'ansible_service_mgr': 'systemd', 'ansible_ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP5lfWZRPolKil+6X2YhLijl9ubFP3nZQ3jftEDv0/73cxkVvyezN+nEC9eCz1rR3jn64HmoyM6oZyClHwdIiN8=', 'ansible_ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ansible_ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIJ3h1iXdWynOCXWRSw+AD/JU3w4PiEUdFkE1hNb6+9TO', 'ansible_ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ansible_ssh_host_key_rsa_public': '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', 'ansible_ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'ansible_swapfree_mb': 0, 'ansible_swaptotal_mb': 0, 'ansible_system': 'Linux', 'ansible_system_capabilities': [''], 'ansible_system_capabilities_enforced': 'True', 'ansible_system_vendor': 'OpenStack Foundation', 'ansible_uptime_seconds': 925, 'ansible_user_dir': '/home/zuul', 'ansible_user_gecos': '', 'ansible_user_gid': 1000, 'ansible_user_id': 'zuul', 'ansible_user_shell': '/bin/bash', 'ansible_user_uid': 1000, 'ansible_userspace_architecture': 'x86_64', 'ansible_userspace_bits': '64', 'ansible_virtualization_role': 'guest', 'ansible_virtualization_tech_guest': ['openstack'], 'ansible_virtualization_tech_host': ['kvm'], 'ansible_virtualization_type': 'openstack', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True, 'cifmw_repo_setup_os_release': 'centos', 'cifmw_repo_setup_dist_major_version': 9, 'cifmw_basedir': '/home/zuul/ci-framework-data', 'cifmw_installyamls_repos': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls', 'cifmw_install_yamls_vars': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}, 'cifmw_operator_build_meta_name': 'openstack-operator', 'cifmw_edpm_prepare_skip_crc_storage_creation': True, 'cifmw_deploy_edpm': True, 'cifmw_openshift_setup_skip_internal_registry': True, 'cifmw_config_certmanager': True, 'pre_infra': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}], 'post_ctlplane_deploy': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}], 'cifmw_use_crc': False, 'cifmw_openshift_setup_skip_internal_registry_tls_verify': True, 'post_infra': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'pre_update': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'cifmw_update_containers': True, 'cifmw_run_tests': True, 'cifmw_run_test_role': 'test_operator', 'cifmw_test_operator_tempest_include_list': 'watcher_tempest_plugin.*\n', 'pre_deploy': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}], 'watcher_repo': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'watcher_coo_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml', 'prometheus_admin_api_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml', 'pre_deploy_create_coo_subscription': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}], 'post_deploy': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}], 'cifmw_edpm_prepare_kustomizations': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}], 'cifmw_edpm_prepare_timeout': 60, 'cifmw_install_yamls_whitelisted_vars': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR'], 'cifmw_test_operator_tempest_tempestconf_config': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}, 'run_tempest': False, 'cifmw_test_operator_tempest_concurrency': 1, 'cifmw_test_operator_tempest_exclude_list': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n', 'playbook_dir': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'ansible_playbook_python': '/usr/bin/python3', 'ansible_config_file': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg', 'groups': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}, 'omit': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef', 'ansible_version': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}, 'ansible_check_mode': False, 'ansible_diff_mode': False, 'ansible_forks': 5, 'ansible_inventory_sources': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'], 'ansible_skip_tags': [], 'ansible_run_tags': ['all'], 'ansible_verbosity': 0}, 'crc': {'cifmw_artifacts_crc_sshkey': '~/.ssh/id_cifw', 'cifmw_build_images_output': {}, 'cifmw_dlrn_report_result': False, 'cifmw_edpm_telemetry_enabled_exporters': ['podman_exporter', 'openstack_network_exporter'], 'cifmw_extras': ['@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml'], 'cifmw_openshift_api': 'api.crc.testing:6443', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_password': '123456789', 'cifmw_openshift_skip_tls_verify': True, 'cifmw_openshift_user': 'kubeadmin', 'cifmw_operator_build_output': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}, 'cifmw_test_operator_tempest_external_plugin': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}], 'cifmw_test_operator_tempest_image_tag': 'watcher_latest', 'cifmw_test_operator_tempest_namespace': 'podified-epoxy-centos9', 'cifmw_test_operator_tempest_registry': '38.129.56.134:5001', 'cifmw_update_containers_openstack': False, 'cifmw_update_containers_org': 'podified-epoxy-centos9', 'cifmw_update_containers_registry': '38.129.56.134:5001', 'cifmw_update_containers_tag': 'watcher_latest', 'cifmw_update_containers_watcher': True, 'cifmw_use_libvirt': False, 'cifmw_zuul_target_host': 'controller', 'content_provider_dlrn_md5_hash': '', 'content_provider_os_registry_url': '38.129.56.134:5001/podified-epoxy-centos9', 'content_provider_registry_ip': '38.129.56.134', 'crc_ci_bootstrap_cloud_name': 'vexxhost', 'crc_ci_bootstrap_networking': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': 1500, 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}, 'enable_ramdisk': True, 'fetch_dlrn_hash': False, 'push_registry': 'quay.rdoproject.org', 'quay_login_secret_name': 'quay_nextgen_zuulgithubci', 'registry_login_enabled': True, 'watcher_scenario': 'edpm-no-notifications', 'watcher_services_tag': 'watcher_latest', 'watcher_tempest_max_microversion': '1.4', 'zuul': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}, 'zuul_log_collection': False, 'inventory_file': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'inventory_dir': '/home/zuul/ci-framework-data/artifacts', 'ansible_connection': 'ssh', 'ansible_host': '38.102.83.32', 'ansible_port': 22, 'ansible_python_interpreter': 'auto', 'ansible_user': 'core', 'nodepool': {'az': 'nova', 'cloud': 'vexxhost-nodepool-tripleo', 'external_id': '6a661c31-2aab-46f6-9356-aadb249c199d', 'host_id': '511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b', 'interface_ip': '38.102.83.32', 'label': 'crc-cloud-ocp-4-18-1-3xl', 'private_ipv4': '38.102.83.32', 'private_ipv6': None, 'provider': 'vexxhost-nodepool-tripleo', 'public_ipv4': '38.102.83.32', 'public_ipv6': '', 'region': 'RegionOne', 'slot': None}, 'inventory_hostname': 'crc', 'inventory_hostname_short': 'crc', 'group_names': ['ocps'], 'ansible_facts': {}, 'cifmw_repo_setup_os_release': 'centos', 'cifmw_repo_setup_dist_major_version': 9, 'cifmw_basedir': '/home/zuul/ci-framework-data', 'ansible_user_dir': '/home/zuul', 'cifmw_installyamls_repos': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls', 'cifmw_install_yamls_vars': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}, 'cifmw_operator_build_meta_name': 'openstack-operator', 'cifmw_edpm_prepare_skip_crc_storage_creation': True, 'cifmw_deploy_edpm': True, 'cifmw_openshift_setup_skip_internal_registry': True, 'cifmw_config_certmanager': True, 'pre_infra': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}], 'post_ctlplane_deploy': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}], 'cifmw_use_crc': False, 'cifmw_openshift_setup_skip_internal_registry_tls_verify': True, 'post_infra': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'pre_update': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'cifmw_update_containers': True, 'cifmw_run_tests': True, 'cifmw_run_test_role': 'test_operator', 'cifmw_test_operator_tempest_include_list': 'watcher_tempest_plugin.*\n', 'pre_deploy': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}], 'watcher_repo': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'watcher_coo_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml', 'prometheus_admin_api_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml', 'pre_deploy_create_coo_subscription': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}], 'post_deploy': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}], 'cifmw_edpm_prepare_kustomizations': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}], 'cifmw_edpm_prepare_timeout': 60, 'cifmw_install_yamls_whitelisted_vars': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR'], 'cifmw_test_operator_tempest_tempestconf_config': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}, 'run_tempest': False, 'cifmw_test_operator_tempest_concurrency': 1, 'cifmw_test_operator_tempest_exclude_list': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n', 'playbook_dir': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'ansible_playbook_python': '/usr/bin/python3', 'ansible_config_file': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg', 'groups': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}, 'omit': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef', 'ansible_version': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}, 'ansible_check_mode': False, 'ansible_diff_mode': False, 'ansible_forks': 5, 'ansible_inventory_sources': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'], 'ansible_skip_tags': [], 'ansible_run_tags': ['all'], 'ansible_verbosity': 0}, 'controller': {'cifmw_artifacts_crc_sshkey': '~/.ssh/id_cifw', 'cifmw_build_images_output': {}, 'cifmw_dlrn_report_result': False, 'cifmw_edpm_telemetry_enabled_exporters': ['podman_exporter', 'openstack_network_exporter'], 'cifmw_extras': ['@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml'], 'cifmw_openshift_api': 'api.crc.testing:6443', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_password': '123456789', 'cifmw_openshift_skip_tls_verify': True, 'cifmw_openshift_user': 'kubeadmin', 'cifmw_operator_build_output': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}, 'cifmw_test_operator_tempest_external_plugin': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}], 'cifmw_test_operator_tempest_image_tag': 'watcher_latest', 'cifmw_test_operator_tempest_namespace': 'podified-epoxy-centos9', 'cifmw_test_operator_tempest_registry': '38.129.56.134:5001', 'cifmw_update_containers_openstack': False, 'cifmw_update_containers_org': 'podified-epoxy-centos9', 'cifmw_update_containers_registry': '38.129.56.134:5001', 'cifmw_update_containers_tag': 'watcher_latest', 'cifmw_update_containers_watcher': True, 'cifmw_use_libvirt': False, 'cifmw_zuul_target_host': 'controller', 'content_provider_dlrn_md5_hash': '', 'content_provider_os_registry_url': '38.129.56.134:5001/podified-epoxy-centos9', 'content_provider_registry_ip': '38.129.56.134', 'crc_ci_bootstrap_cloud_name': 'vexxhost', 'crc_ci_bootstrap_networking': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': 1500, 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}, 'enable_ramdisk': True, 'fetch_dlrn_hash': False, 'push_registry': 'quay.rdoproject.org', 'quay_login_secret_name': 'quay_nextgen_zuulgithubci', 'registry_login_enabled': True, 'watcher_scenario': 'edpm-no-notifications', 'watcher_services_tag': 'watcher_latest', 'watcher_tempest_max_microversion': '1.4', 'zuul': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}, 'zuul_log_collection': False, 'inventory_file': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'inventory_dir': '/home/zuul/ci-framework-data/artifacts', 'ansible_connection': 'ssh', 'ansible_host': '38.102.83.234', 'ansible_port': 22, 'ansible_python_interpreter': 'auto', 'ansible_user': 'zuul', 'nodepool': {'az': 'nova', 'cloud': 'vexxhost-nodepool-tripleo', 'external_id': 'c9e5525c-be6a-4403-ada0-560c7a7414b1', 'host_id': 'd19710e37f7b2620eb9f1bc9cfdfc06732b1f0c31221781941dd4533', 'interface_ip': '38.102.83.234', 'label': 'cloud-centos-9-stream-tripleo-medium', 'private_ipv4': '38.102.83.234', 'private_ipv6': None, 'provider': 'vexxhost-nodepool-tripleo', 'public_ipv4': '38.102.83.234', 'public_ipv6': '', 'region': 'RegionOne', 'slot': None}, 'inventory_hostname': 'controller', 'inventory_hostname_short': 'controller', 'group_names': ['ungrouped'], 'ansible_facts': {}, 'cifmw_repo_setup_os_release': 'centos', 'cifmw_repo_setup_dist_major_version': 9, 'cifmw_basedir': '/home/zuul/ci-framework-data', 'ansible_user_dir': '/home/zuul', 'cifmw_installyamls_repos': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls', 'cifmw_install_yamls_vars': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}, 'cifmw_operator_build_meta_name': 'openstack-operator', 'cifmw_edpm_prepare_skip_crc_storage_creation': True, 'cifmw_deploy_edpm': True, 'cifmw_openshift_setup_skip_internal_registry': True, 'cifmw_config_certmanager': True, 'pre_infra': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}], 'post_ctlplane_deploy': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}], 'cifmw_use_crc': False, 'cifmw_openshift_setup_skip_internal_registry_tls_verify': True, 'post_infra': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'pre_update': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'cifmw_update_containers': True, 'cifmw_run_tests': True, 'cifmw_run_test_role': 'test_operator', 'cifmw_test_operator_tempest_include_list': 'watcher_tempest_plugin.*\n', 'pre_deploy': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}], 'watcher_repo': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'watcher_coo_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml', 'prometheus_admin_api_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml', 'pre_deploy_create_coo_subscription': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}], 'post_deploy': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}], 'cifmw_edpm_prepare_kustomizations': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}], 'cifmw_edpm_prepare_timeout': 60, 'cifmw_install_yamls_whitelisted_vars': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR'], 'cifmw_test_operator_tempest_tempestconf_config': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}, 'run_tempest': False, 'cifmw_test_operator_tempest_concurrency': 1, 'cifmw_test_operator_tempest_exclude_list': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n', 'playbook_dir': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'ansible_playbook_python': '/usr/bin/python3', 'ansible_config_file': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg', 'groups': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}, 'omit': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef', 'ansible_version': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}, 'ansible_check_mode': False, 'ansible_diff_mode': False, 'ansible_forks': 5, 'ansible_inventory_sources': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'], 'ansible_skip_tags': [], 'ansible_run_tags': ['all'], 'ansible_verbosity': 0}, 'localhost': {'cifmw_artifacts_crc_sshkey': '~/.ssh/id_cifw', 'cifmw_build_images_output': {}, 'cifmw_dlrn_report_result': False, 'cifmw_edpm_telemetry_enabled_exporters': ['podman_exporter', 'openstack_network_exporter'], 'cifmw_extras': ['@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml', '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml'], 'cifmw_openshift_api': 'api.crc.testing:6443', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_password': '123456789', 'cifmw_openshift_skip_tls_verify': True, 'cifmw_openshift_user': 'kubeadmin', 'cifmw_operator_build_output': {'operators': {'openstack-operator': {'git_commit_hash': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'git_src_dir': '~/src/github.com/openstack-k8s-operators/openstack-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-bundle:c14431f58910936f1f6da0cffcc79cd112323a2e', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/openstack-operator-index:c14431f58910936f1f6da0cffcc79cd112323a2e'}, 'watcher-operator': {'git_commit_hash': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'git_src_dir': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'image': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_bundle': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-bundle:f4db4918d3d9d309fe468fe457835ad03c41d70c', 'image_catalog': '38.129.56.134:5001/openstack-k8s-operators/watcher-operator-index:f4db4918d3d9d309fe468fe457835ad03c41d70c'}}}, 'cifmw_test_operator_tempest_external_plugin': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}], 'cifmw_test_operator_tempest_image_tag': 'watcher_latest', 'cifmw_test_operator_tempest_namespace': 'podified-epoxy-centos9', 'cifmw_test_operator_tempest_registry': '38.129.56.134:5001', 'cifmw_update_containers_openstack': False, 'cifmw_update_containers_org': 'podified-epoxy-centos9', 'cifmw_update_containers_registry': '38.129.56.134:5001', 'cifmw_update_containers_tag': 'watcher_latest', 'cifmw_update_containers_watcher': True, 'cifmw_use_libvirt': False, 'cifmw_zuul_target_host': 'controller', 'content_provider_dlrn_md5_hash': '', 'content_provider_os_registry_url': '38.129.56.134:5001/podified-epoxy-centos9', 'content_provider_registry_ip': '38.129.56.134', 'crc_ci_bootstrap_cloud_name': "{{ nodepool.cloud | replace('-nodepool-tripleo','') }}", 'crc_ci_bootstrap_networking': {'instances': {'compute-0': {'networks': {'default': {'ip': '192.168.122.100'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.100'}, 'storage': {'config_nm': False, 'ip': '172.18.0.100'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.100'}}}, 'compute-1': {'networks': {'default': {'ip': '192.168.122.101'}, 'internal-api': {'config_nm': False, 'ip': '172.17.0.101'}, 'storage': {'config_nm': False, 'ip': '172.18.0.101'}, 'tenant': {'config_nm': False, 'ip': '172.19.0.101'}}}, 'controller': {'networks': {'default': {'ip': '192.168.122.11'}}}, 'crc': {'networks': {'default': {'ip': '192.168.122.10'}, 'internal-api': {'ip': '172.17.0.5'}, 'storage': {'ip': '172.18.0.5'}, 'tenant': {'ip': '172.19.0.5'}}}}, 'networks': {'default': {'mtu': "{{ ('ibm' in nodepool.cloud) | ternary('1440', '1500') }}", 'range': '192.168.122.0/24', 'router_net': '', 'transparent': True}, 'internal-api': {'range': '172.17.0.0/24', 'vlan': 20}, 'storage': {'range': '172.18.0.0/24', 'vlan': 21}, 'tenant': {'range': '172.19.0.0/24', 'vlan': 22}}}, 'enable_ramdisk': True, 'fetch_dlrn_hash': False, 'push_registry': 'quay.rdoproject.org', 'quay_login_secret_name': 'quay_nextgen_zuulgithubci', 'registry_login_enabled': True, 'watcher_scenario': 'edpm-no-notifications', 'watcher_services_tag': 'watcher_latest', 'watcher_tempest_max_microversion': '1.4', 'zuul': {'_inheritance_path': ['', '', '', '', '', '', '', '', ''], 'ansible_version': '8', 'attempts': 1, 'branch': 'main', 'build': '6749c1fdf9d7426d8dd042f414201cfd', 'build_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'buildset': '72d3b6f1d0b941b9a05ecef1e485fff8', 'buildset_refs': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator'}, 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator', 'topic': None}], 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'child_jobs': [], 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'event_id': '7aa0a520-9f6f-11f0-9a53-59d7a2f6d31f', 'executor': {'hostname': 'ze01.softwarefactory-project.io', 'inventory_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/ansible/inventory.yaml', 'log_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/logs', 'result_data_file': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/results.json', 'src_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work/src', 'work_root': '/var/lib/zuul/builds/6749c1fdf9d7426d8dd042f414201cfd/work'}, 'items': [{'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}], 'job': 'watcher-operator-validation-epoxy', 'jobtags': [], 'max_attempts': 1, 'message': 'Update module github.com/rabbitmq/cluster-operator/v2 to v2.16.0

This PR contains the following updates:

| Package | Change | Age | Confidence |
|---|---|---|---|
| [github.com/rabbitmq/cluster-operator/v2](https://redirect.github.com/rabbitmq/cluster-operator) | `v2.9.0` -> `v2.16.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frabbitmq%2fcluster-operator%2fv2/v2.9.0/v2.16.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |

---

### Release Notes

<details>
<summary>rabbitmq/cluster-operator (github.com/rabbitmq/cluster-operator/v2)</summary>

### [`v2.16.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.16.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.16.0 -->

#### What's Changed

- Support scale to zero rabbitMQ by [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

#### New Contributors

- [@&#8203;jonathanCaamano](https://redirect.github.com/jonathanCaamano) made their first contribution in [#&#8203;1899](https://redirect.github.com/rabbitmq/cluster-operator/pull/1899)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.15.0...v2.16.0>

### [`v2.15.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.15.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.15.0 -->

#### What's Changed

- update prometheus rules for rabbitmq v4.1 by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1883](https://redirect.github.com/rabbitmq/cluster-operator/pull/1883)
- Optionally enable all feature flags automatically by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1892](https://redirect.github.com/rabbitmq/cluster-operator/pull/1892)
- Deploy RabbitMQ 4.1.1 by default by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1893](https://redirect.github.com/rabbitmq/cluster-operator/pull/1893)
- Refactor olm by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1895](https://redirect.github.com/rabbitmq/cluster-operator/pull/1895)
- Final tweaks to OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1897](https://redirect.github.com/rabbitmq/cluster-operator/pull/1897)
- Update queue grafana dashboard by [@&#8203;kcolford](https://redirect.github.com/kcolford) in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)
- RMQ-1753, Bump go - Fixes CVE-2025-22874 by [@&#8203;PujaVad](https://redirect.github.com/PujaVad) in [#&#8203;1898](https://redirect.github.com/rabbitmq/cluster-operator/pull/1898)

#### New Contributors

- [@&#8203;kcolford](https://redirect.github.com/kcolford) made their first contribution in [#&#8203;1896](https://redirect.github.com/rabbitmq/cluster-operator/pull/1896)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.14.0...v2.15.0>

### [`v2.14.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.14.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.14.0 -->

#### What's Changed

- Include default delayStartSeconds value in documentation by [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)
- Track tools using `tool` directive by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1873](https://redirect.github.com/rabbitmq/cluster-operator/pull/1873)
- Point dashboard to the main branch by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1881](https://redirect.github.com/rabbitmq/cluster-operator/pull/1881)
- Log a line when FIPS is enabled by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1882](https://redirect.github.com/rabbitmq/cluster-operator/pull/1882)
- Refactor tools and bump dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1885](https://redirect.github.com/rabbitmq/cluster-operator/pull/1885)

#### New Contributors

- [@&#8203;sillyfrog](https://redirect.github.com/sillyfrog) made their first contribution in [#&#8203;1870](https://redirect.github.com/rabbitmq/cluster-operator/pull/1870)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.13.0...v2.14.0>

### [`v2.13.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.13.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.13.0 -->

#### What's Changed

- Use `rabbitmq:4.1.0-management` as the default image by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1867](https://redirect.github.com/rabbitmq/cluster-operator/pull/1867)
- Reduce init container memory from 500Mi to 64Mi and CPU from 100m to 20m by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1863](https://redirect.github.com/rabbitmq/cluster-operator/pull/1863)
- Add support for custom Service labels via spec.service.labels by [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)
- PrometheusRule for rabbitmq alarm states by [@&#8203;awoimbee](https://redirect.github.com/awoimbee) in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- Improve cluster deletion by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1864](https://redirect.github.com/rabbitmq/cluster-operator/pull/1864)
- Add promtool for alert rule validation by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1824](https://redirect.github.com/rabbitmq/cluster-operator/pull/1824)
- configure rules to merge rabbitmq\_identity\_info by [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- Bump (almost) all deps by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1866](https://redirect.github.com/rabbitmq/cluster-operator/pull/1866)
- Modernize the codebase by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1868](https://redirect.github.com/rabbitmq/cluster-operator/pull/1868)
- adding back replaces field on operatorhub publication by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1815](https://redirect.github.com/rabbitmq/cluster-operator/pull/1815)

#### New Contributors

- [@&#8203;awoimbee](https://redirect.github.com/awoimbee) made their first contribution in [#&#8203;1823](https://redirect.github.com/rabbitmq/cluster-operator/pull/1823)
- [@&#8203;mmueller-rs](https://redirect.github.com/mmueller-rs) made their first contribution in [#&#8203;1856](https://redirect.github.com/rabbitmq/cluster-operator/pull/1856)
- [@&#8203;EladAviczer](https://redirect.github.com/EladAviczer) made their first contribution in [#&#8203;1859](https://redirect.github.com/rabbitmq/cluster-operator/pull/1859)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.1...v2.13.0>

### [`v2.12.1`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.1)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.12.1 -->

#### What's Changed

- Example of importing from a ConfigMap and a Secret by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1802](https://redirect.github.com/rabbitmq/cluster-operator/pull/1802)
- Move tools to a dedicated internal module by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1803](https://redirect.github.com/rabbitmq/cluster-operator/pull/1803)
- Update docker cache in CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1811](https://redirect.github.com/rabbitmq/cluster-operator/pull/1811)
- Update deps by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1810](https://redirect.github.com/rabbitmq/cluster-operator/pull/1810)
- Fix olm action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1812](https://redirect.github.com/rabbitmq/cluster-operator/pull/1812)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.12.0...v2.12.1>

### [`v2.12.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.12.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0)

#### What's Changed

- If the `image` is not specified, this version defaults to `rabbitmq:4.0.5-management` (PR [#&#8203;1792](https://redirect.github.com/rabbitmq/cluster-operator/pull/1792))
- `readinessProbe` and `LivenessProbe` can be overridden (PR [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776))

#### New Contributors

- [@&#8203;chengjoey](https://redirect.github.com/chengjoey) made their first contribution in [#&#8203;1776](https://redirect.github.com/rabbitmq/cluster-operator/pull/1776)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.11.0...v2.12.0>

### [`v2.11.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.11.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.11.0 -->

#### What's Changed

- Add connection\_string secret to default\_user secret by [@&#8203;hxyannay](https://redirect.github.com/hxyannay) in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)
- Update condition to enable Web MQTT/STOMP TLS ports by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1735](https://redirect.github.com/rabbitmq/cluster-operator/pull/1735)
- Fix linter errors by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1736](https://redirect.github.com/rabbitmq/cluster-operator/pull/1736)
- Ignore mirroring related shutdown errors by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1740](https://redirect.github.com/rabbitmq/cluster-operator/pull/1740)
- Update dependencies by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1744](https://redirect.github.com/rabbitmq/cluster-operator/pull/1744)
- Fix CA certs overriding server certs by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1747](https://redirect.github.com/rabbitmq/cluster-operator/pull/1747)

#### New Contributors

- [@&#8203;hxyannay](https://redirect.github.com/hxyannay) made their first contribution in [#&#8203;1721](https://redirect.github.com/rabbitmq/cluster-operator/pull/1721)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.10.0...v2.11.0>

### [`v2.10.0`](https://redirect.github.com/rabbitmq/cluster-operator/releases/tag/v2.10.0)

[Compare Source](https://redirect.github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0)

⚠️ Upgrading the cluster-operator to this version will update RabbitMQ clusters (i.e. will cause rolling update of the underlying StatefulSets).
If you want to control when a RabbitMQ cluster gets updated, make sure to pause reconciliation before upgrading the cluster-operator.
After upgrading the cluster-operator, resume reconciliation whenever it's safe to update the RabbitMQ cluster.
See [Pause reconciliation for a RabbitMQ cluster](https://www.rabbitmq.com/kubernetes/operator/using-operator#pause).

<!-- Release notes generated using configuration in .github/release.yml at v2.10.0 -->

#### What's Changed

- small fix on testing\_and\_publishing\_OLM\_bundle action by [@&#8203;DanielePalaia](https://redirect.github.com/DanielePalaia) in [#&#8203;1641](https://redirect.github.com/rabbitmq/cluster-operator/pull/1641)
- force string for resource attributes in examples by [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- Replace deprecated `patchesStrategicMerge` with v1beta1 `patches`. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1658](https://redirect.github.com/rabbitmq/cluster-operator/pull/1658)
- Refactor CI by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1693](https://redirect.github.com/rabbitmq/cluster-operator/pull/1693)
- Add rabbitmq.com/disable-default-topology-spread-constraints annotation by [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)
- Disable ANONYMOUS login by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1705](https://redirect.github.com/rabbitmq/cluster-operator/pull/1705)
- Increase max length of additionalConfig by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1710](https://redirect.github.com/rabbitmq/cluster-operator/pull/1710)
- Fix docker syntax warnings from github actions. by [@&#8203;MirahImage](https://redirect.github.com/MirahImage) in [#&#8203;1711](https://redirect.github.com/rabbitmq/cluster-operator/pull/1711)
- Default to RabbitMQ 3.13.7 by [@&#8203;mkuratczyk](https://redirect.github.com/mkuratczyk) in [#&#8203;1712](https://redirect.github.com/rabbitmq/cluster-operator/pull/1712) [#&#8203;1651](https://redirect.github.com/rabbitmq/cluster-operator/pull/1651) [#&#8203;1691](https://redirect.github.com/rabbitmq/cluster-operator/pull/1691)
- Remove vm\_memory\_high\_watermark\_paging\_ratio by [@&#8203;ansd](https://redirect.github.com/ansd) in [#&#8203;1714](https://redirect.github.com/rabbitmq/cluster-operator/pull/1714)
- Fix OLM workflow by [@&#8203;Zerpet](https://redirect.github.com/Zerpet) in [#&#8203;1715](https://redirect.github.com/rabbitmq/cluster-operator/pull/1715)

#### New Contributors

- [@&#8203;nicoangelo](https://redirect.github.com/nicoangelo) made their first contribution in [#&#8203;1647](https://redirect.github.com/rabbitmq/cluster-operator/pull/1647)
- [@&#8203;DanielDorado](https://redirect.github.com/DanielDorado) made their first contribution in [#&#8203;1694](https://redirect.github.com/rabbitmq/cluster-operator/pull/1694)

**Full Changelog**: <https://github.com/rabbitmq/cluster-operator/compare/v2.9.0...v2.10.0>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://redirect.github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xMzEuNiIsInVwZGF0ZWRJblZlciI6IjQxLjEzMi41IiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6W119-->
', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'pipeline': 'github-check', 'playbook_context': {'playbook_projects': {'trusted/project_0/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'trusted/project_1/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'trusted/project_2/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}, 'trusted/project_3/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework': {'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'commit': '2a995b7c41482c85667efc1265e08ed356518960'}, 'untrusted/project_1/review.rdoproject.org/config': {'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c'}, 'untrusted/project_2/opendev.org/zuul/zuul-jobs': {'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46'}, 'untrusted/project_3/review.rdoproject.org/rdo-jobs': {'canonical_name': 'review.rdoproject.org/rdo-jobs', 'checkout': 'master', 'commit': 'd207d5ad1c5824d6db58c2eb5935a8b36674cbe4'}}, 'playbooks': [{'path': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml', 'roles': [{'checkout': 'main', 'checkout_description': 'playbook branch', 'link_name': 'ansible/playbook_0/role_0/ci-framework', 'link_target': 'untrusted/project_0/github.com/openstack-k8s-operators/ci-framework', 'role_path': 'ansible/playbook_0/role_0/ci-framework/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_1/config', 'link_target': 'untrusted/project_1/review.rdoproject.org/config', 'role_path': 'ansible/playbook_0/role_1/config/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_2/zuul-jobs', 'link_target': 'untrusted/project_2/opendev.org/zuul/zuul-jobs', 'role_path': 'ansible/playbook_0/role_2/zuul-jobs/roles'}, {'checkout': 'master', 'checkout_description': 'project default branch', 'link_name': 'ansible/playbook_0/role_3/rdo-jobs', 'link_target': 'untrusted/project_3/review.rdoproject.org/rdo-jobs', 'role_path': 'ansible/playbook_0/role_3/rdo-jobs/roles'}]}]}, 'post_review': False, 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'projects': {'github.com/crc-org/crc-cloud': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/crc-org/crc-cloud', 'checkout': 'main', 'checkout_description': 'project override ref', 'commit': 'f6ed2f2d118884a075895bbf954ff6000e540430', 'name': 'crc-org/crc-cloud', 'required': True, 'short_name': 'crc-cloud', 'src_dir': 'src/github.com/crc-org/crc-cloud'}, 'github.com/openstack-k8s-operators/ci-framework': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '2a995b7c41482c85667efc1265e08ed356518960', 'name': 'openstack-k8s-operators/ci-framework', 'required': True, 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'github.com/openstack-k8s-operators/edpm-ansible': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/edpm-ansible', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'a5cf980b1d54f9dfb94673b65352a338364bec6e', 'name': 'openstack-k8s-operators/edpm-ansible', 'required': True, 'short_name': 'edpm-ansible', 'src_dir': 'src/github.com/openstack-k8s-operators/edpm-ansible'}, 'github.com/openstack-k8s-operators/infra-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'b871f7317c57245c430774fc9870e9ce5151badb', 'name': 'openstack-k8s-operators/infra-operator', 'required': True, 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'github.com/openstack-k8s-operators/install_yamls': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/install_yamls', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '5e6668da315d07a7f52d0bf14ce5e0c141a7564d', 'name': 'openstack-k8s-operators/install_yamls', 'required': True, 'short_name': 'install_yamls', 'src_dir': 'src/github.com/openstack-k8s-operators/install_yamls'}, 'github.com/openstack-k8s-operators/openstack-baremetal-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-baremetal-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c3087316ef1bb68e99d4b53e6c264cca476a944e', 'name': 'openstack-k8s-operators/openstack-baremetal-operator', 'required': True, 'short_name': 'openstack-baremetal-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-baremetal-operator'}, 'github.com/openstack-k8s-operators/openstack-must-gather': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-must-gather', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '9cb73a8e48993a1fa9365522eddf74b00e792f86', 'name': 'openstack-k8s-operators/openstack-must-gather', 'required': True, 'short_name': 'openstack-must-gather', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-must-gather'}, 'github.com/openstack-k8s-operators/openstack-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/openstack-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'c14431f58910936f1f6da0cffcc79cd112323a2e', 'name': 'openstack-k8s-operators/openstack-operator', 'required': True, 'short_name': 'openstack-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/openstack-operator'}, 'github.com/openstack-k8s-operators/repo-setup': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/repo-setup', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': '37b10946c6a10f9fa26c13305f06bfd6867e723f', 'name': 'openstack-k8s-operators/repo-setup', 'required': True, 'short_name': 'repo-setup', 'src_dir': 'src/github.com/openstack-k8s-operators/repo-setup'}, 'github.com/openstack-k8s-operators/watcher-operator': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'checkout': 'main', 'checkout_description': 'zuul branch', 'commit': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'name': 'openstack-k8s-operators/watcher-operator', 'required': False, 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'opendev.org/zuul/zuul-jobs': {'canonical_hostname': 'opendev.org', 'canonical_name': 'opendev.org/zuul/zuul-jobs', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': 'dccb4f69180671413012d9f10b7ed17687735f46', 'name': 'zuul/zuul-jobs', 'required': True, 'short_name': 'zuul-jobs', 'src_dir': 'src/opendev.org/zuul/zuul-jobs'}, 'review.rdoproject.org/config': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/config', 'checkout': 'master', 'checkout_description': 'project default branch', 'commit': '941f6f7666fdff0145523beb29ceda8db25c234c', 'name': 'config', 'required': True, 'short_name': 'config', 'src_dir': 'src/review.rdoproject.org/config'}}, 'ref': 'refs/pull/282/head', 'resources': {}, 'tenant': 'rdoproject.org', 'timeout': 10800, 'topic': None, 'voting': True}, 'zuul_log_collection': False, 'inventory_file': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'inventory_dir': '/home/zuul/ci-framework-data/artifacts', 'ansible_connection': 'local', 'inventory_hostname': 'localhost', 'inventory_hostname_short': 'localhost', 'group_names': ['ungrouped'], 'ansible_facts': {'all_ipv4_addresses': ['38.102.83.234', '192.168.122.11'], 'all_ipv6_addresses': ['fe80::f816:3eff:fed0:d11d'], 'apparmor': {'status': 'disabled'}, 'architecture': 'x86_64', 'bios_date': '04/01/2014', 'bios_vendor': 'SeaBIOS', 'bios_version': '1.15.0-1', 'board_asset_tag': 'NA', 'board_name': 'NA', 'board_serial': 'NA', 'board_vendor': 'NA', 'board_version': 'NA', 'chassis_asset_tag': 'NA', 'chassis_serial': 'NA', 'chassis_vendor': 'QEMU', 'chassis_version': 'pc-i440fx-6.2', 'cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404423', 'epoch_int': '1759404423', 'hour': '11', 'iso8601': '2025-10-02T11:27:03Z', 'iso8601_basic': '20251002T112703559411', 'iso8601_basic_short': '20251002T112703', 'iso8601_micro': '2025-10-02T11:27:03.559411Z', 'minute': '27', 'month': '10', 'second': '03', 'time': '11:27:03', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'default_ipv4': {'address': '38.102.83.234', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d0:d1:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'default_ipv6': {}, 'device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-24-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-24-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '83883999', 'sectorsize': 512, 'size': '40.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '83886080', 'sectorsize': '512', 'size': '40.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'distribution': 'CentOS', 'distribution_file_parsed': True, 'distribution_file_path': '/etc/centos-release', 'distribution_file_variety': 'CentOS', 'distribution_major_version': '9', 'distribution_release': 'Stream', 'distribution_version': '9', 'dns': {'nameservers': ['192.168.122.10', '199.204.44.24', '199.204.47.54']}, 'domain': '', 'effective_group_id': 1000, 'effective_user_id': 1000, 'env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '2', 'SSH_CLIENT': '38.102.83.114 46100 22', 'SSH_CONNECTION': '38.102.83.114 46100 38.102.83.234 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '9', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.234', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed0:d11d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d0:d1:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.11', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f4:c5:7f', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'fibre_channel_wwn': [], 'fips': False, 'form_factor': 'Other', 'fqdn': 'controller', 'hostname': 'controller', 'hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'interfaces': ['eth1', 'eth0', 'lo'], 'is_chroot': False, 'iscsi_iqn': '', 'kernel': '5.14.0-620.el9.x86_64', 'kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'loadavg': {'15m': 0.46, '1m': 1.39, '5m': 0.89}, 'ansible_local': {}, 'locally_reachable_ips': {'ipv4': ['38.102.83.234', '127.0.0.0/8', '127.0.0.1', '192.168.122.11'], 'ipv6': ['::1', 'fe80::f816:3eff:fed0:d11d']}, 'lsb': {}, 'lvm': 'N/A', 'machine': 'x86_64', 'machine_id': '42833e1b511a402df82cb9cb2fc36491', 'memfree_mb': 1416, 'memory_mb': {'nocache': {'free': 2856, 'used': 799}, 'real': {'free': 1416, 'total': 3655, 'used': 2239}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'memtotal_mb': 3655, 'mounts': [{'block_available': 9529128, 'block_size': 4096, 'block_total': 10469115, 'block_used': 939987, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 20820648, 'inode_total': 20970992, 'inode_used': 150344, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 39031308288, 'size_total': 42881495040, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'nodename': 'controller', 'os_family': 'RedHat', 'pkg_mgr': 'dnf', 'proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'processor_cores': 1, 'processor_count': 2, 'processor_nproc': 2, 'processor_threads_per_core': 1, 'processor_vcpus': 2, 'product_name': 'OpenStack Nova', 'product_serial': 'NA', 'product_uuid': 'NA', 'product_version': '26.2.1', 'python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'python_version': '3.9.23', 'real_group_id': 1000, 'real_user_id': 1000, 'selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'selinux_python_present': True, 'service_mgr': 'systemd', 'ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGG4MzHlfwvzeT3W/zrr6TJ2cSQd6hyBBPmn1XwhNIr/KW6MPYk90J6OKQdbxeCEbEBM5K/vOJFDhs/PMeoubu4=', 'ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIHjgsVCPXLzIRvcCo758q6qxwbewyur4jVPU9eTKThxl', 'ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ssh_host_key_rsa_public': 'AAAAB3NzaC1yc2EAAAADAQABAAABgQCRJ8VhreeIro+qbaqiN7NegGrhE5CVL0p5aAbIrhDXVnFmUY0nUjinTHB51xzNjBXch/0MGv8LjN2+sq50JNF7WJHs4T4ZLrPLVhM0GoA4GuYKI6oeMWjTDnw2sAEyGA9C33Hs5T3zo7wnEWZeM7fdSYareOPNvbVFIai0QgroKxk05wsBGBMlslw0492UAbhWLq5ZidF6du7WotdWpKePdZJt5tfBdYh83i5cEUCzJQ2+TNp+Xtv6p0q60GiU3MlO0rGxUJGhlUi2Ocj7CS39fj0bp0NWp3IZlyfdCB/YrDItEGX6rLnFdZ0FxZxM7ripOXx1If4lRLmlq+w/gE/llEqv8Rb6OY22+bRBs4ClBBSctpagUnfRfdsbrn7TDj2SUJXiliiZRnErYuveNXugmXHf1xEoc+OD4v3P5eo8/P7d1KZVKR8SJHLtMEQc1H3933ejBMtybNy3qAzdPEnYGDF54JdbxobeNrgx86Jg9QKGKv+h86RzwdE+8yv9mHE=', 'ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'swapfree_mb': 0, 'swaptotal_mb': 0, 'system': 'Linux', 'system_capabilities': [''], 'system_capabilities_enforced': 'True', 'system_vendor': 'OpenStack Foundation', 'uptime_seconds': 803, 'user_dir': '/home/zuul', 'user_gecos': '', 'user_gid': 1000, 'user_id': 'zuul', 'user_shell': '/bin/bash', 'user_uid': 1000, 'userspace_architecture': 'x86_64', 'userspace_bits': '64', 'virtualization_role': 'guest', 'virtualization_tech_guest': ['openstack'], 'virtualization_tech_host': ['kvm'], 'virtualization_type': 'openstack', 'cifmw_discovered_hash': '0653754d2af8079f7c677f47fa5006beb1f727ca036526ac8bf07bf53cd43e47', 'cifmw_discovered_hash_algorithm': 'sha256', 'cifmw_discovered_image_name': 'CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_discovered_image_url': 'https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_edpm_deploy_env': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_TAG': 'a0eac564d779a7eaac46c9816bff261a', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/home/zuul/ci-framework-data/nova-extra-config.conf', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_SINGLE_NODE': 'false', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['0.0.0.0/0']", 'DATAPLANE_TOTAL_NODES': 2, 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'PATH': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'SSH_KEY_FILE': '/home/zuul/.ssh/id_cifw', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_install_yamls_defaults': {'ADOPTED_EXTERNAL_NETWORK': '172.21.1.0/24', 'ADOPTED_INTERNALAPI_NETWORK': '172.17.1.0/24', 'ADOPTED_STORAGEMGMT_NETWORK': '172.20.1.0/24', 'ADOPTED_STORAGE_NETWORK': '172.18.1.0/24', 'ADOPTED_TENANT_NETWORK': '172.9.1.0/24', 'ANSIBLEEE': 'config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_BRANCH': 'main', 'ANSIBLEEE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest', 'ANSIBLEEE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml', 'ANSIBLEEE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests', 'ANSIBLEEE_KUTTL_NAMESPACE': 'ansibleee-kuttl-tests', 'ANSIBLEEE_REPO': 'https://github.com/openstack-k8s-operators/openstack-ansibleee-operator', 'ANSIBLEE_COMMIT_HASH': '', 'BARBICAN': 'config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_BRANCH': 'main', 'BARBICAN_COMMIT_HASH': '', 'BARBICAN_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_DEPL_IMG': 'unused', 'BARBICAN_IMG': 'quay.io/openstack-k8s-operators/barbican-operator-index:latest', 'BARBICAN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml', 'BARBICAN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests', 'BARBICAN_KUTTL_NAMESPACE': 'barbican-kuttl-tests', 'BARBICAN_REPO': 'https://github.com/openstack-k8s-operators/barbican-operator.git', 'BARBICAN_SERVICE_ENABLED': 'true', 'BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY': 'sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=', 'BAREMETAL_BRANCH': 'main', 'BAREMETAL_COMMIT_HASH': '', 'BAREMETAL_IMG': 'quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest', 'BAREMETAL_OS_CONTAINER_IMG': '', 'BAREMETAL_OS_IMG': '', 'BAREMETAL_REPO': 'https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git', 'BAREMETAL_TIMEOUT': '20m', 'BASH_IMG': 'quay.io/openstack-k8s-operators/bash:latest', 'BGP_ASN': '64999', 'BGP_LEAF_1': '100.65.4.1', 'BGP_LEAF_2': '100.64.4.1', 'BGP_OVN_ROUTING': 'false', 'BGP_PEER_ASN': '64999', 'BGP_SOURCE_IP': '172.30.4.2', 'BGP_SOURCE_IP6': 'f00d:f00d:f00d:f00d:f00d:f00d:f00d:42', 'BMAAS_BRIDGE_IPV4_PREFIX': '172.20.1.2/24', 'BMAAS_BRIDGE_IPV6_PREFIX': 'fd00:bbbb::2/64', 'BMAAS_INSTANCE_DISK_SIZE': '20', 'BMAAS_INSTANCE_MEMORY': '4096', 'BMAAS_INSTANCE_NAME_PREFIX': 'crc-bmaas', 'BMAAS_INSTANCE_NET_MODEL': 'virtio', 'BMAAS_INSTANCE_OS_VARIANT': 'centos-stream9', 'BMAAS_INSTANCE_VCPUS': '2', 'BMAAS_INSTANCE_VIRT_TYPE': 'kvm', 'BMAAS_IPV4': 'true', 'BMAAS_IPV6': 'false', 'BMAAS_LIBVIRT_USER': 'sushyemu', 'BMAAS_METALLB_ADDRESS_POOL': '172.20.1.64/26', 'BMAAS_METALLB_POOL_NAME': 'baremetal', 'BMAAS_NETWORK_IPV4_PREFIX': '172.20.1.1/24', 'BMAAS_NETWORK_IPV6_PREFIX': 'fd00:bbbb::1/64', 'BMAAS_NETWORK_NAME': 'crc-bmaas', 'BMAAS_NODE_COUNT': '1', 'BMAAS_OCP_INSTANCE_NAME': 'crc', 'BMAAS_REDFISH_PASSWORD': 'password', 'BMAAS_REDFISH_USERNAME': 'admin', 'BMAAS_ROUTE_LIBVIRT_NETWORKS': 'crc-bmaas,crc,default', 'BMAAS_SUSHY_EMULATOR_DRIVER': 'libvirt', 'BMAAS_SUSHY_EMULATOR_IMAGE': 'quay.io/metal3-io/sushy-tools:latest', 'BMAAS_SUSHY_EMULATOR_NAMESPACE': 'sushy-emulator', 'BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE': '/etc/openstack/clouds.yaml', 'BMAAS_SUSHY_EMULATOR_OS_CLOUD': 'openstack', 'BMH_NAMESPACE': 'openstack', 'BMO_BRANCH': 'release-0.9', 'BMO_COMMIT_HASH': '', 'BMO_IPA_BRANCH': 'stable/2024.1', 'BMO_IRONIC_HOST': '192.168.122.10', 'BMO_PROVISIONING_INTERFACE': '', 'BMO_REPO': 'https://github.com/metal3-io/baremetal-operator', 'BMO_SETUP': False, 'BMO_SETUP_ROUTE_REPLACE': 'true', 'BM_CTLPLANE_INTERFACE': 'enp1s0', 'BM_INSTANCE_MEMORY': '8192', 'BM_INSTANCE_NAME_PREFIX': 'edpm-compute-baremetal', 'BM_INSTANCE_NAME_SUFFIX': '0', 'BM_NETWORK_NAME': 'default', 'BM_NODE_COUNT': '1', 'BM_ROOT_PASSWORD': '', 'BM_ROOT_PASSWORD_SECRET': '', 'CEILOMETER_CENTRAL_DEPL_IMG': 'unused', 'CEILOMETER_NOTIFICATION_DEPL_IMG': 'unused', 'CEPH_BRANCH': 'release-1.15', 'CEPH_CLIENT': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml', 'CEPH_COMMON': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml', 'CEPH_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml', 'CEPH_CRDS': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml', 'CEPH_IMG': 'quay.io/ceph/demo:latest-squid', 'CEPH_OP': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml', 'CEPH_REPO': 'https://github.com/rook/rook.git', 'CERTMANAGER_TIMEOUT': '300s', 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'CINDER': 'config/samples/cinder_v1beta1_cinder.yaml', 'CINDERAPI_DEPL_IMG': 'unused', 'CINDERBKP_DEPL_IMG': 'unused', 'CINDERSCH_DEPL_IMG': 'unused', 'CINDERVOL_DEPL_IMG': 'unused', 'CINDER_BRANCH': 'main', 'CINDER_COMMIT_HASH': '', 'CINDER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml', 'CINDER_IMG': 'quay.io/openstack-k8s-operators/cinder-operator-index:latest', 'CINDER_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml', 'CINDER_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests', 'CINDER_KUTTL_NAMESPACE': 'cinder-kuttl-tests', 'CINDER_REPO': 'https://github.com/openstack-k8s-operators/cinder-operator.git', 'CLEANUP_DIR_CMD': 'rm -Rf', 'CRC_BGP_NIC_1_MAC': '52:54:00:11:11:11', 'CRC_BGP_NIC_2_MAC': '52:54:00:11:11:12', 'CRC_HTTPS_PROXY': '', 'CRC_HTTP_PROXY': '', 'CRC_STORAGE_NAMESPACE': 'crc-storage', 'CRC_STORAGE_RETRIES': '3', 'CRC_URL': "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", 'CRC_VERSION': 'latest', 'DATAPLANE_ANSIBLE_SECRET': 'dataplane-ansible-ssh-private-key-secret', 'DATAPLANE_ANSIBLE_USER': '', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_PREFIX': 'openstack', 'DATAPLANE_CONTAINER_TAG': 'current-podified', 'DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest', 'DATAPLANE_DEFAULT_GW': '192.168.122.1', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/dev/null', 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=100%', 'DATAPLANE_KUSTOMIZE_SCENARIO': 'preprovisioned', 'DATAPLANE_NETWORKER_IP': '192.168.122.200', 'DATAPLANE_NETWORK_INTERFACE_NAME': 'eth0', 'DATAPLANE_NOVA_NFS_PATH': '', 'DATAPLANE_NTP_SERVER': 'pool.ntp.org', 'DATAPLANE_PLAYBOOK': 'osp.edpm.download_cache', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_RUNNER_IMG': '', 'DATAPLANE_SERVER_ROLE': 'compute', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['192.168.122.0/24']", 'DATAPLANE_TIMEOUT': '30m', 'DATAPLANE_TLS_ENABLED': 'true', 'DATAPLANE_TOTAL_NETWORKER_NODES': '1', 'DATAPLANE_TOTAL_NODES': '1', 'DBSERVICE': 'galera', 'DESIGNATE': 'config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_BRANCH': 'main', 'DESIGNATE_COMMIT_HASH': '', 'DESIGNATE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_IMG': 'quay.io/openstack-k8s-operators/designate-operator-index:latest', 'DESIGNATE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml', 'DESIGNATE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests', 'DESIGNATE_KUTTL_NAMESPACE': 'designate-kuttl-tests', 'DESIGNATE_REPO': 'https://github.com/openstack-k8s-operators/designate-operator.git', 'DNSDATA': 'config/samples/network_v1beta1_dnsdata.yaml', 'DNSDATA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml', 'DNSMASQ': 'config/samples/network_v1beta1_dnsmasq.yaml', 'DNSMASQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml', 'DNS_DEPL_IMG': 'unused', 'DNS_DOMAIN': 'localdomain', 'DOWNLOAD_TOOLS_SELECTION': 'all', 'EDPM_ATTACH_EXTNET': 'true', 'EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES': "'[]'", 'EDPM_COMPUTE_ADDITIONAL_NETWORKS': "'[]'", 'EDPM_COMPUTE_CELLS': '1', 'EDPM_COMPUTE_CEPH_ENABLED': 'true', 'EDPM_COMPUTE_CEPH_NOVA': 'true', 'EDPM_COMPUTE_DHCP_AGENT_ENABLED': 'true', 'EDPM_COMPUTE_SRIOV_ENABLED': 'true', 'EDPM_COMPUTE_SUFFIX': '0', 'EDPM_CONFIGURE_DEFAULT_ROUTE': 'true', 'EDPM_CONFIGURE_HUGEPAGES': 'false', 'EDPM_CONFIGURE_NETWORKING': 'true', 'EDPM_FIRSTBOOT_EXTRA': '/tmp/edpm-firstboot-extra', 'EDPM_NETWORKER_SUFFIX': '0', 'EDPM_TOTAL_NETWORKERS': '1', 'EDPM_TOTAL_NODES': '1', 'GALERA_REPLICAS': '', 'GENERATE_SSH_KEYS': 'true', 'GIT_CLONE_OPTS': '', 'GLANCE': 'config/samples/glance_v1beta1_glance.yaml', 'GLANCEAPI_DEPL_IMG': 'unused', 'GLANCE_BRANCH': 'main', 'GLANCE_COMMIT_HASH': '', 'GLANCE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml', 'GLANCE_IMG': 'quay.io/openstack-k8s-operators/glance-operator-index:latest', 'GLANCE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml', 'GLANCE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests', 'GLANCE_KUTTL_NAMESPACE': 'glance-kuttl-tests', 'GLANCE_REPO': 'https://github.com/openstack-k8s-operators/glance-operator.git', 'HEAT': 'config/samples/heat_v1beta1_heat.yaml', 'HEATAPI_DEPL_IMG': 'unused', 'HEATCFNAPI_DEPL_IMG': 'unused', 'HEATENGINE_DEPL_IMG': 'unused', 'HEAT_AUTH_ENCRYPTION_KEY': '767c3ed056cbaa3b9dfedb8c6f825bf0', 'HEAT_BRANCH': 'main', 'HEAT_COMMIT_HASH': '', 'HEAT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml', 'HEAT_IMG': 'quay.io/openstack-k8s-operators/heat-operator-index:latest', 'HEAT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml', 'HEAT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests', 'HEAT_KUTTL_NAMESPACE': 'heat-kuttl-tests', 'HEAT_REPO': 'https://github.com/openstack-k8s-operators/heat-operator.git', 'HEAT_SERVICE_ENABLED': 'true', 'HORIZON': 'config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_BRANCH': 'main', 'HORIZON_COMMIT_HASH': '', 'HORIZON_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_DEPL_IMG': 'unused', 'HORIZON_IMG': 'quay.io/openstack-k8s-operators/horizon-operator-index:latest', 'HORIZON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml', 'HORIZON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests', 'HORIZON_KUTTL_NAMESPACE': 'horizon-kuttl-tests', 'HORIZON_REPO': 'https://github.com/openstack-k8s-operators/horizon-operator.git', 'INFRA_BRANCH': 'main', 'INFRA_COMMIT_HASH': '', 'INFRA_IMG': 'quay.io/openstack-k8s-operators/infra-operator-index:latest', 'INFRA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml', 'INFRA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests', 'INFRA_KUTTL_NAMESPACE': 'infra-kuttl-tests', 'INFRA_REPO': 'https://github.com/openstack-k8s-operators/infra-operator.git', 'INSTALL_CERT_MANAGER': False, 'INSTALL_NMSTATE': 'true || false', 'INSTALL_NNCP': 'true || false', 'INTERNALAPI_HOST_ROUTES': '', 'IPV6_LAB_IPV4_NETWORK_IPADDRESS': '172.30.0.1/24', 'IPV6_LAB_IPV6_NETWORK_IPADDRESS': 'fd00:abcd:abcd:fc00::1/64', 'IPV6_LAB_LIBVIRT_STORAGE_POOL': 'default', 'IPV6_LAB_MANAGE_FIREWALLD': 'true', 'IPV6_LAB_NAT64_HOST_IPV4': '172.30.0.2/24', 'IPV6_LAB_NAT64_HOST_IPV6': 'fd00:abcd:abcd:fc00::2/64', 'IPV6_LAB_NAT64_INSTANCE_NAME': 'nat64-router', 'IPV6_LAB_NAT64_IPV6_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL': '192.168.255.0/24', 'IPV6_LAB_NAT64_TAYGA_IPV4': '192.168.255.1', 'IPV6_LAB_NAT64_TAYGA_IPV6': 'fd00:abcd:abcd:fc00::3', 'IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX': 'fd00:abcd:abcd:fcff::/96', 'IPV6_LAB_NAT64_UPDATE_PACKAGES': 'false', 'IPV6_LAB_NETWORK_NAME': 'nat64', 'IPV6_LAB_SNO_CLUSTER_NETWORK': 'fd00:abcd:0::/48', 'IPV6_LAB_SNO_HOST_IP': 'fd00:abcd:abcd:fc00::11', 'IPV6_LAB_SNO_HOST_PREFIX': '64', 'IPV6_LAB_SNO_INSTANCE_NAME': 'sno', 'IPV6_LAB_SNO_MACHINE_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_SNO_OCP_MIRROR_URL': 'https://mirror.openshift.com/pub/openshift-v4/clients/ocp', 'IPV6_LAB_SNO_OCP_VERSION': 'latest-4.14', 'IPV6_LAB_SNO_SERVICE_NETWORK': 'fd00:abcd:abcd:fc03::/112', 'IPV6_LAB_SSH_PUB_KEY': '/home/zuul/.ssh/id_rsa.pub', 'IPV6_LAB_WORK_DIR': '/home/zuul/.ipv6lab', 'IRONIC': 'config/samples/ironic_v1beta1_ironic.yaml', 'IRONICAPI_DEPL_IMG': 'unused', 'IRONICCON_DEPL_IMG': 'unused', 'IRONICINS_DEPL_IMG': 'unused', 'IRONICNAG_DEPL_IMG': 'unused', 'IRONICPXE_DEPL_IMG': 'unused', 'IRONIC_BRANCH': 'main', 'IRONIC_COMMIT_HASH': '', 'IRONIC_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml', 'IRONIC_IMAGE_TAG': 'release-24.1', 'IRONIC_IMG': 'quay.io/openstack-k8s-operators/ironic-operator-index:latest', 'IRONIC_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml', 'IRONIC_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests', 'IRONIC_KUTTL_NAMESPACE': 'ironic-kuttl-tests', 'IRONIC_REPO': 'https://github.com/openstack-k8s-operators/ironic-operator.git', 'KEYSTONEAPI': 'config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_DEPL_IMG': 'unused', 'KEYSTONE_BRANCH': 'main', 'KEYSTONE_COMMIT_HASH': '', 'KEYSTONE_FEDERATION_CLIENT_SECRET': 'COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f', 'KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE': 'openstack', 'KEYSTONE_IMG': 'quay.io/openstack-k8s-operators/keystone-operator-index:latest', 'KEYSTONE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml', 'KEYSTONE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests', 'KEYSTONE_KUTTL_NAMESPACE': 'keystone-kuttl-tests', 'KEYSTONE_REPO': 'https://github.com/openstack-k8s-operators/keystone-operator.git', 'KUBEADMIN_PWD': '12345678', 'LIBVIRT_SECRET': 'libvirt-secret', 'LOKI_DEPLOY_MODE': 'openshift-network', 'LOKI_DEPLOY_NAMESPACE': 'netobserv', 'LOKI_DEPLOY_SIZE': '1x.demo', 'LOKI_NAMESPACE': 'openshift-operators-redhat', 'LOKI_OPERATOR_GROUP': 'openshift-operators-redhat-loki', 'LOKI_SUBSCRIPTION': 'loki-operator', 'LVMS_CR': '1', 'MANILA': 'config/samples/manila_v1beta1_manila.yaml', 'MANILAAPI_DEPL_IMG': 'unused', 'MANILASCH_DEPL_IMG': 'unused', 'MANILASHARE_DEPL_IMG': 'unused', 'MANILA_BRANCH': 'main', 'MANILA_COMMIT_HASH': '', 'MANILA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml', 'MANILA_IMG': 'quay.io/openstack-k8s-operators/manila-operator-index:latest', 'MANILA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml', 'MANILA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests', 'MANILA_KUTTL_NAMESPACE': 'manila-kuttl-tests', 'MANILA_REPO': 'https://github.com/openstack-k8s-operators/manila-operator.git', 'MANILA_SERVICE_ENABLED': 'true', 'MARIADB': 'config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_BRANCH': 'main', 'MARIADB_CHAINSAW_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml', 'MARIADB_CHAINSAW_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests', 'MARIADB_CHAINSAW_NAMESPACE': 'mariadb-chainsaw-tests', 'MARIADB_COMMIT_HASH': '', 'MARIADB_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_DEPL_IMG': 'unused', 'MARIADB_IMG': 'quay.io/openstack-k8s-operators/mariadb-operator-index:latest', 'MARIADB_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml', 'MARIADB_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests', 'MARIADB_KUTTL_NAMESPACE': 'mariadb-kuttl-tests', 'MARIADB_REPO': 'https://github.com/openstack-k8s-operators/mariadb-operator.git', 'MEMCACHED': 'config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_DEPL_IMG': 'unused', 'METADATA_SHARED_SECRET': '1234567842', 'METALLB_IPV6_POOL': 'fd00:aaaa::80-fd00:aaaa::90', 'METALLB_POOL': '192.168.122.80-192.168.122.90', 'MICROSHIFT': '0', 'NAMESPACE': 'openstack', 'NETCONFIG': 'config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_DEPL_IMG': 'unused', 'NETOBSERV_DEPLOY_NAMESPACE': 'netobserv', 'NETOBSERV_NAMESPACE': 'openshift-netobserv-operator', 'NETOBSERV_OPERATOR_GROUP': 'openshift-netobserv-operator-net', 'NETOBSERV_SUBSCRIPTION': 'netobserv-operator', 'NETWORK_BGP': 'false', 'NETWORK_DESIGNATE_ADDRESS_PREFIX': '172.28.0', 'NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX': '172.50.0', 'NETWORK_INTERNALAPI_ADDRESS_PREFIX': '172.17.0', 'NETWORK_ISOLATION': 'true', 'NETWORK_ISOLATION_INSTANCE_NAME': 'crc', 'NETWORK_ISOLATION_IPV4': 'true', 'NETWORK_ISOLATION_IPV4_ADDRESS': '172.16.1.1/24', 'NETWORK_ISOLATION_IPV4_NAT': 'true', 'NETWORK_ISOLATION_IPV6': 'false', 'NETWORK_ISOLATION_IPV6_ADDRESS': 'fd00:aaaa::1/64', 'NETWORK_ISOLATION_IP_ADDRESS': '192.168.122.10', 'NETWORK_ISOLATION_MAC': '52:54:00:11:11:10', 'NETWORK_ISOLATION_NETWORK_NAME': 'net-iso', 'NETWORK_ISOLATION_NET_NAME': 'default', 'NETWORK_ISOLATION_USE_DEFAULT_NETWORK': 'true', 'NETWORK_MTU': '1500', 'NETWORK_STORAGEMGMT_ADDRESS_PREFIX': '172.20.0', 'NETWORK_STORAGE_ADDRESS_PREFIX': '172.18.0', 'NETWORK_STORAGE_MACVLAN': '', 'NETWORK_TENANT_ADDRESS_PREFIX': '172.19.0', 'NETWORK_VLAN_START': '20', 'NETWORK_VLAN_STEP': '1', 'NEUTRONAPI': 'config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_DEPL_IMG': 'unused', 'NEUTRON_BRANCH': 'main', 'NEUTRON_COMMIT_HASH': '', 'NEUTRON_IMG': 'quay.io/openstack-k8s-operators/neutron-operator-index:latest', 'NEUTRON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml', 'NEUTRON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests', 'NEUTRON_KUTTL_NAMESPACE': 'neutron-kuttl-tests', 'NEUTRON_REPO': 'https://github.com/openstack-k8s-operators/neutron-operator.git', 'NFS_HOME': '/home/nfs', 'NMSTATE_NAMESPACE': 'openshift-nmstate', 'NMSTATE_OPERATOR_GROUP': 'openshift-nmstate-tn6k8', 'NMSTATE_SUBSCRIPTION': 'kubernetes-nmstate-operator', 'NNCP_ADDITIONAL_HOST_ROUTES': '', 'NNCP_BGP_1_INTERFACE': 'enp7s0', 'NNCP_BGP_1_IP_ADDRESS': '100.65.4.2', 'NNCP_BGP_2_INTERFACE': 'enp8s0', 'NNCP_BGP_2_IP_ADDRESS': '100.64.4.2', 'NNCP_BRIDGE': 'ospbr', 'NNCP_CLEANUP_TIMEOUT': '120s', 'NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX': 'fd00:aaaa::', 'NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX': '10', 'NNCP_CTLPLANE_IP_ADDRESS_PREFIX': '192.168.122', 'NNCP_CTLPLANE_IP_ADDRESS_SUFFIX': '10', 'NNCP_DNS_SERVER': '192.168.122.1', 'NNCP_DNS_SERVER_IPV6': 'fd00:aaaa::1', 'NNCP_GATEWAY': '192.168.122.1', 'NNCP_GATEWAY_IPV6': 'fd00:aaaa::1', 'NNCP_INTERFACE': 'enp6s0', 'NNCP_NODES': '', 'NNCP_TIMEOUT': '240s', 'NOVA': 'config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_BRANCH': 'main', 'NOVA_COMMIT_HASH': '', 'NOVA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_IMG': 'quay.io/openstack-k8s-operators/nova-operator-index:latest', 'NOVA_REPO': 'https://github.com/openstack-k8s-operators/nova-operator.git', 'NUMBER_OF_INSTANCES': '1', 'OCP_NETWORK_NAME': 'crc', 'OCTAVIA': 'config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_BRANCH': 'main', 'OCTAVIA_COMMIT_HASH': '', 'OCTAVIA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_IMG': 'quay.io/openstack-k8s-operators/octavia-operator-index:latest', 'OCTAVIA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml', 'OCTAVIA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests', 'OCTAVIA_KUTTL_NAMESPACE': 'octavia-kuttl-tests', 'OCTAVIA_REPO': 'https://github.com/openstack-k8s-operators/octavia-operator.git', 'OKD': 'false', 'OPENSTACK_BRANCH': 'main', 'OPENSTACK_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-bundle:latest', 'OPENSTACK_COMMIT_HASH': '', 'OPENSTACK_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_CRDS_DIR': 'openstack_crds', 'OPENSTACK_CTLPLANE': 'config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-index:latest', 'OPENSTACK_K8S_BRANCH': 'main', 'OPENSTACK_K8S_TAG': 'latest', 'OPENSTACK_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml', 'OPENSTACK_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests', 'OPENSTACK_KUTTL_NAMESPACE': 'openstack-kuttl-tests', 'OPENSTACK_NEUTRON_CUSTOM_CONF': '', 'OPENSTACK_REPO': 'https://github.com/openstack-k8s-operators/openstack-operator.git', 'OPENSTACK_STORAGE_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest', 'OPERATOR_BASE_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator', 'OPERATOR_CHANNEL': '', 'OPERATOR_NAMESPACE': 'openstack-operators', 'OPERATOR_SOURCE': '', 'OPERATOR_SOURCE_NAMESPACE': '', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'OVNCONTROLLER': 'config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_NMAP': 'true', 'OVNDBS': 'config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNDBS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNNORTHD': 'config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVNNORTHD_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVN_BRANCH': 'main', 'OVN_COMMIT_HASH': '', 'OVN_IMG': 'quay.io/openstack-k8s-operators/ovn-operator-index:latest', 'OVN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml', 'OVN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests', 'OVN_KUTTL_NAMESPACE': 'ovn-kuttl-tests', 'OVN_REPO': 'https://github.com/openstack-k8s-operators/ovn-operator.git', 'PASSWORD': '12345678', 'PLACEMENTAPI': 'config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_DEPL_IMG': 'unused', 'PLACEMENT_BRANCH': 'main', 'PLACEMENT_COMMIT_HASH': '', 'PLACEMENT_IMG': 'quay.io/openstack-k8s-operators/placement-operator-index:latest', 'PLACEMENT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml', 'PLACEMENT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests', 'PLACEMENT_KUTTL_NAMESPACE': 'placement-kuttl-tests', 'PLACEMENT_REPO': 'https://github.com/openstack-k8s-operators/placement-operator.git', 'PULL_SECRET': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt', 'RABBITMQ': 'docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_BRANCH': 'patches', 'RABBITMQ_COMMIT_HASH': '', 'RABBITMQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_DEPL_IMG': 'unused', 'RABBITMQ_IMG': 'quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest', 'RABBITMQ_REPO': 'https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git', 'REDHAT_OPERATORS': 'false', 'REDIS': 'config/samples/redis_v1beta1_redis.yaml', 'REDIS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml', 'REDIS_DEPL_IMG': 'unused', 'RH_REGISTRY_PWD': '', 'RH_REGISTRY_USER': '', 'SECRET': 'osp-secret', 'SG_CORE_DEPL_IMG': 'unused', 'STANDALONE_COMPUTE_DRIVER': 'libvirt', 'STANDALONE_EXTERNAL_NET_PREFFIX': '172.21.0', 'STANDALONE_INTERNALAPI_NET_PREFIX': '172.17.0', 'STANDALONE_STORAGEMGMT_NET_PREFIX': '172.20.0', 'STANDALONE_STORAGE_NET_PREFIX': '172.18.0', 'STANDALONE_TENANT_NET_PREFIX': '172.19.0', 'STORAGEMGMT_HOST_ROUTES': '', 'STORAGE_CLASS': 'local-storage', 'STORAGE_HOST_ROUTES': '', 'SWIFT': 'config/samples/swift_v1beta1_swift.yaml', 'SWIFT_BRANCH': 'main', 'SWIFT_COMMIT_HASH': '', 'SWIFT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml', 'SWIFT_IMG': 'quay.io/openstack-k8s-operators/swift-operator-index:latest', 'SWIFT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml', 'SWIFT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests', 'SWIFT_KUTTL_NAMESPACE': 'swift-kuttl-tests', 'SWIFT_REPO': 'https://github.com/openstack-k8s-operators/swift-operator.git', 'TELEMETRY': 'config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_BRANCH': 'main', 'TELEMETRY_COMMIT_HASH': '', 'TELEMETRY_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_IMG': 'quay.io/openstack-k8s-operators/telemetry-operator-index:latest', 'TELEMETRY_KUTTL_BASEDIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator', 'TELEMETRY_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml', 'TELEMETRY_KUTTL_NAMESPACE': 'telemetry-kuttl-tests', 'TELEMETRY_KUTTL_RELPATH': 'tests/kuttl/suites', 'TELEMETRY_REPO': 'https://github.com/openstack-k8s-operators/telemetry-operator.git', 'TENANT_HOST_ROUTES': '', 'TIMEOUT': '300s', 'TLS_ENABLED': 'false', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'tripleo_deploy': 'export REGISTRY_PWD:'}, 'cifmw_install_yamls_environment': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_openshift_api': 'https://api.crc.testing:6443', 'cifmw_openshift_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_login_api': 'https://api.crc.testing:6443', 'cifmw_openshift_login_cert_login': False, 'cifmw_openshift_login_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_login_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_login_password': 123456789, 'cifmw_openshift_login_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_openshift_login_user': 'kubeadmin', 'cifmw_openshift_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_openshift_user': 'kubeadmin', 'cifmw_path': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'cifmw_repo_setup_commit_hash': None, 'cifmw_repo_setup_distro_hash': None, 'cifmw_repo_setup_dlrn_api_url': 'https://trunk.rdoproject.org/api-centos9-antelope', 'cifmw_repo_setup_dlrn_url': 'https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5', 'cifmw_repo_setup_extended_hash': None, 'cifmw_repo_setup_full_hash': 'a0eac564d779a7eaac46c9816bff261a', 'cifmw_repo_setup_release': 'antelope', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True}, 'ansible_all_ipv4_addresses': ['38.102.83.234', '192.168.122.11'], 'ansible_all_ipv6_addresses': ['fe80::f816:3eff:fed0:d11d'], 'ansible_apparmor': {'status': 'disabled'}, 'ansible_architecture': 'x86_64', 'ansible_bios_date': '04/01/2014', 'ansible_bios_vendor': 'SeaBIOS', 'ansible_bios_version': '1.15.0-1', 'ansible_board_asset_tag': 'NA', 'ansible_board_name': 'NA', 'ansible_board_serial': 'NA', 'ansible_board_vendor': 'NA', 'ansible_board_version': 'NA', 'ansible_chassis_asset_tag': 'NA', 'ansible_chassis_serial': 'NA', 'ansible_chassis_vendor': 'QEMU', 'ansible_chassis_version': 'pc-i440fx-6.2', 'ansible_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_date_time': {'date': '2025-10-02', 'day': '02', 'epoch': '1759404423', 'epoch_int': '1759404423', 'hour': '11', 'iso8601': '2025-10-02T11:27:03Z', 'iso8601_basic': '20251002T112703559411', 'iso8601_basic_short': '20251002T112703', 'iso8601_micro': '2025-10-02T11:27:03.559411Z', 'minute': '27', 'month': '10', 'second': '03', 'time': '11:27:03', 'tz': 'UTC', 'tz_dst': 'UTC', 'tz_offset': '+0000', 'weekday': 'Thursday', 'weekday_number': '4', 'weeknumber': '39', 'year': '2025'}, 'ansible_default_ipv4': {'address': '38.102.83.234', 'alias': 'eth0', 'broadcast': '38.102.83.255', 'gateway': '38.102.83.1', 'interface': 'eth0', 'macaddress': 'fa:16:3e:d0:d1:1d', 'mtu': 1500, 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24', 'type': 'ether'}, 'ansible_default_ipv6': {}, 'ansible_device_links': {'ids': {'sr0': ['ata-QEMU_DVD-ROM_QM00001']}, 'labels': {'sr0': ['config-2']}, 'masters': {}, 'uuids': {'sr0': ['2025-10-02-11-13-24-00'], 'vda1': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}}, 'ansible_devices': {'sr0': {'holders': [], 'host': '', 'links': {'ids': ['ata-QEMU_DVD-ROM_QM00001'], 'labels': ['config-2'], 'masters': [], 'uuids': ['2025-10-02-11-13-24-00']}, 'model': 'QEMU DVD-ROM', 'partitions': {}, 'removable': '1', 'rotational': '0', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'mq-deadline', 'sectors': '964', 'sectorsize': '2048', 'size': '482.00 KB', 'support_discard': '2048', 'vendor': 'QEMU', 'virtual': 1}, 'vda': {'holders': [], 'host': '', 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': []}, 'model': None, 'partitions': {'vda1': {'holders': [], 'links': {'ids': [], 'labels': [], 'masters': [], 'uuids': ['1631a6ad-43b8-436d-ae76-16fa14b94458']}, 'sectors': '83883999', 'sectorsize': 512, 'size': '40.00 GB', 'start': '2048', 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}}, 'removable': '0', 'rotational': '1', 'sas_address': None, 'sas_device_handle': None, 'scheduler_mode': 'none', 'sectors': '83886080', 'sectorsize': '512', 'size': '40.00 GB', 'support_discard': '512', 'vendor': '0x1af4', 'virtual': 1}}, 'ansible_distribution': 'CentOS', 'ansible_distribution_file_parsed': True, 'ansible_distribution_file_path': '/etc/centos-release', 'ansible_distribution_file_variety': 'CentOS', 'ansible_distribution_major_version': '9', 'ansible_distribution_release': 'Stream', 'ansible_distribution_version': '9', 'ansible_dns': {'nameservers': ['192.168.122.10', '199.204.44.24', '199.204.47.54']}, 'ansible_domain': '', 'ansible_effective_group_id': 1000, 'ansible_effective_user_id': 1000, 'ansible_env': {'BASH_FUNC_which%%': '() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}', 'DBUS_SESSION_BUS_ADDRESS': 'unix:path=/run/user/1000/bus', 'DEBUGINFOD_IMA_CERT_PATH': '/etc/keys/ima:', 'DEBUGINFOD_URLS': 'https://debuginfod.centos.org/ ', 'HOME': '/home/zuul', 'LANG': 'en_US.UTF-8', 'LESSOPEN': '||/usr/bin/lesspipe.sh %s', 'LOGNAME': 'zuul', 'MOTD_SHOWN': 'pam', 'PATH': '/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'PWD': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'SELINUX_LEVEL_REQUESTED': '', 'SELINUX_ROLE_REQUESTED': '', 'SELINUX_USE_CURRENT_RANGE': '', 'SHELL': '/bin/bash', 'SHLVL': '2', 'SSH_CLIENT': '38.102.83.114 46100 22', 'SSH_CONNECTION': '38.102.83.114 46100 38.102.83.234 22', 'USER': 'zuul', 'XDG_RUNTIME_DIR': '/run/user/1000', 'XDG_SESSION_CLASS': 'user', 'XDG_SESSION_ID': '9', 'XDG_SESSION_TYPE': 'tty', '_': '/usr/bin/python3', 'which_declare': 'declare -f'}, 'ansible_eth0': {'active': True, 'device': 'eth0', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '38.102.83.234', 'broadcast': '38.102.83.255', 'netmask': '255.255.255.0', 'network': '38.102.83.0', 'prefix': '24'}, 'ipv6': [{'address': 'fe80::f816:3eff:fed0:d11d', 'prefix': '64', 'scope': 'link'}], 'macaddress': 'fa:16:3e:d0:d1:1d', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio1', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_eth1': {'active': True, 'device': 'eth1', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'off [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'on', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'on [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'off [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'off [fixed]', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'on [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off', 'tx_scatter_gather': 'on', 'tx_scatter_gather_fraglist': 'off [fixed]', 'tx_sctp_segmentation': 'off [fixed]', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'off', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'off [fixed]', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'off [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '192.168.122.11', 'broadcast': '192.168.122.255', 'netmask': '255.255.255.0', 'network': '192.168.122.0', 'prefix': '24'}, 'macaddress': 'fa:16:3e:f4:c5:7f', 'module': 'virtio_net', 'mtu': 1500, 'pciid': 'virtio5', 'promisc': False, 'speed': -1, 'timestamping': [], 'type': 'ether'}, 'ansible_fibre_channel_wwn': [], 'ansible_fips': False, 'ansible_form_factor': 'Other', 'ansible_fqdn': 'controller', 'ansible_hostname': 'controller', 'ansible_hostnqn': 'nqn.2014-08.org.nvmexpress:uuid:2f7d2450-18ac-43a6-80ee-9caa4a7736e0', 'ansible_interfaces': ['eth1', 'eth0', 'lo'], 'ansible_is_chroot': False, 'ansible_iscsi_iqn': '', 'ansible_kernel': '5.14.0-620.el9.x86_64', 'ansible_kernel_version': '#1 SMP PREEMPT_DYNAMIC Fri Sep 26 01:13:23 UTC 2025', 'ansible_lo': {'active': True, 'device': 'lo', 'features': {'esp_hw_offload': 'off [fixed]', 'esp_tx_csum_hw_offload': 'off [fixed]', 'generic_receive_offload': 'on', 'generic_segmentation_offload': 'on', 'highdma': 'on [fixed]', 'hsr_dup_offload': 'off [fixed]', 'hsr_fwd_offload': 'off [fixed]', 'hsr_tag_ins_offload': 'off [fixed]', 'hsr_tag_rm_offload': 'off [fixed]', 'hw_tc_offload': 'off [fixed]', 'l2_fwd_offload': 'off [fixed]', 'large_receive_offload': 'off [fixed]', 'loopback': 'on [fixed]', 'macsec_hw_offload': 'off [fixed]', 'ntuple_filters': 'off [fixed]', 'receive_hashing': 'off [fixed]', 'rx_all': 'off [fixed]', 'rx_checksumming': 'on [fixed]', 'rx_fcs': 'off [fixed]', 'rx_gro_hw': 'off [fixed]', 'rx_gro_list': 'off', 'rx_udp_gro_forwarding': 'off', 'rx_udp_tunnel_port_offload': 'off [fixed]', 'rx_vlan_filter': 'off [fixed]', 'rx_vlan_offload': 'off [fixed]', 'rx_vlan_stag_filter': 'off [fixed]', 'rx_vlan_stag_hw_parse': 'off [fixed]', 'scatter_gather': 'on', 'tcp_segmentation_offload': 'on', 'tls_hw_record': 'off [fixed]', 'tls_hw_rx_offload': 'off [fixed]', 'tls_hw_tx_offload': 'off [fixed]', 'tx_checksum_fcoe_crc': 'off [fixed]', 'tx_checksum_ip_generic': 'on [fixed]', 'tx_checksum_ipv4': 'off [fixed]', 'tx_checksum_ipv6': 'off [fixed]', 'tx_checksum_sctp': 'on [fixed]', 'tx_checksumming': 'on', 'tx_esp_segmentation': 'off [fixed]', 'tx_fcoe_segmentation': 'off [fixed]', 'tx_gre_csum_segmentation': 'off [fixed]', 'tx_gre_segmentation': 'off [fixed]', 'tx_gso_list': 'on', 'tx_gso_partial': 'off [fixed]', 'tx_gso_robust': 'off [fixed]', 'tx_ipxip4_segmentation': 'off [fixed]', 'tx_ipxip6_segmentation': 'off [fixed]', 'tx_nocache_copy': 'off [fixed]', 'tx_scatter_gather': 'on [fixed]', 'tx_scatter_gather_fraglist': 'on [fixed]', 'tx_sctp_segmentation': 'on', 'tx_tcp6_segmentation': 'on', 'tx_tcp_ecn_segmentation': 'on', 'tx_tcp_mangleid_segmentation': 'on', 'tx_tcp_segmentation': 'on', 'tx_tunnel_remcsum_segmentation': 'off [fixed]', 'tx_udp_segmentation': 'on', 'tx_udp_tnl_csum_segmentation': 'off [fixed]', 'tx_udp_tnl_segmentation': 'off [fixed]', 'tx_vlan_offload': 'off [fixed]', 'tx_vlan_stag_hw_insert': 'off [fixed]', 'vlan_challenged': 'on [fixed]'}, 'hw_timestamp_filters': [], 'ipv4': {'address': '127.0.0.1', 'broadcast': '', 'netmask': '255.0.0.0', 'network': '127.0.0.0', 'prefix': '8'}, 'ipv6': [{'address': '::1', 'prefix': '128', 'scope': 'host'}], 'mtu': 65536, 'promisc': False, 'timestamping': [], 'type': 'loopback'}, 'ansible_loadavg': {'15m': 0.46, '1m': 1.39, '5m': 0.89}, 'ansible_local': {}, 'ansible_locally_reachable_ips': {'ipv4': ['38.102.83.234', '127.0.0.0/8', '127.0.0.1', '192.168.122.11'], 'ipv6': ['::1', 'fe80::f816:3eff:fed0:d11d']}, 'ansible_lsb': {}, 'ansible_lvm': 'N/A', 'ansible_machine': 'x86_64', 'ansible_machine_id': '42833e1b511a402df82cb9cb2fc36491', 'ansible_memfree_mb': 1416, 'ansible_memory_mb': {'nocache': {'free': 2856, 'used': 799}, 'real': {'free': 1416, 'total': 3655, 'used': 2239}, 'swap': {'cached': 0, 'free': 0, 'total': 0, 'used': 0}}, 'ansible_memtotal_mb': 3655, 'ansible_mounts': [{'block_available': 9529128, 'block_size': 4096, 'block_total': 10469115, 'block_used': 939987, 'device': '/dev/vda1', 'fstype': 'xfs', 'inode_available': 20820648, 'inode_total': 20970992, 'inode_used': 150344, 'mount': '/', 'options': 'rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota', 'size_available': 39031308288, 'size_total': 42881495040, 'uuid': '1631a6ad-43b8-436d-ae76-16fa14b94458'}], 'ansible_nodename': 'controller', 'ansible_os_family': 'RedHat', 'ansible_pkg_mgr': 'dnf', 'ansible_proc_cmdline': {'BOOT_IMAGE': '(hd0,msdos1)/boot/vmlinuz-5.14.0-620.el9.x86_64', 'console': 'ttyS0,115200n8', 'crashkernel': '1G-2G:192M,2G-64G:256M,64G-:512M', 'net.ifnames': '0', 'no_timer_check': True, 'ro': True, 'root': 'UUID=1631a6ad-43b8-436d-ae76-16fa14b94458'}, 'ansible_processor': ['0', 'AuthenticAMD', 'AMD EPYC-Rome Processor', '1', 'AuthenticAMD', 'AMD EPYC-Rome Processor'], 'ansible_processor_cores': 1, 'ansible_processor_count': 2, 'ansible_processor_nproc': 2, 'ansible_processor_threads_per_core': 1, 'ansible_processor_vcpus': 2, 'ansible_product_name': 'OpenStack Nova', 'ansible_product_serial': 'NA', 'ansible_product_uuid': 'NA', 'ansible_product_version': '26.2.1', 'ansible_python': {'executable': '/usr/bin/python3', 'has_sslcontext': True, 'type': 'cpython', 'version': {'major': 3, 'micro': 23, 'minor': 9, 'releaselevel': 'final', 'serial': 0}, 'version_info': [3, 9, 23, 'final', 0]}, 'ansible_python_version': '3.9.23', 'ansible_real_group_id': 1000, 'ansible_real_user_id': 1000, 'ansible_selinux': {'config_mode': 'enforcing', 'mode': 'enforcing', 'policyvers': 33, 'status': 'enabled', 'type': 'targeted'}, 'ansible_selinux_python_present': True, 'ansible_service_mgr': 'systemd', 'ansible_ssh_host_key_ecdsa_public': 'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGG4MzHlfwvzeT3W/zrr6TJ2cSQd6hyBBPmn1XwhNIr/KW6MPYk90J6OKQdbxeCEbEBM5K/vOJFDhs/PMeoubu4=', 'ansible_ssh_host_key_ecdsa_public_keytype': 'ecdsa-sha2-nistp256', 'ansible_ssh_host_key_ed25519_public': 'AAAAC3NzaC1lZDI1NTE5AAAAIHjgsVCPXLzIRvcCo758q6qxwbewyur4jVPU9eTKThxl', 'ansible_ssh_host_key_ed25519_public_keytype': 'ssh-ed25519', 'ansible_ssh_host_key_rsa_public': 'AAAAB3NzaC1yc2EAAAADAQABAAABgQCRJ8VhreeIro+qbaqiN7NegGrhE5CVL0p5aAbIrhDXVnFmUY0nUjinTHB51xzNjBXch/0MGv8LjN2+sq50JNF7WJHs4T4ZLrPLVhM0GoA4GuYKI6oeMWjTDnw2sAEyGA9C33Hs5T3zo7wnEWZeM7fdSYareOPNvbVFIai0QgroKxk05wsBGBMlslw0492UAbhWLq5ZidF6du7WotdWpKePdZJt5tfBdYh83i5cEUCzJQ2+TNp+Xtv6p0q60GiU3MlO0rGxUJGhlUi2Ocj7CS39fj0bp0NWp3IZlyfdCB/YrDItEGX6rLnFdZ0FxZxM7ripOXx1If4lRLmlq+w/gE/llEqv8Rb6OY22+bRBs4ClBBSctpagUnfRfdsbrn7TDj2SUJXiliiZRnErYuveNXugmXHf1xEoc+OD4v3P5eo8/P7d1KZVKR8SJHLtMEQc1H3933ejBMtybNy3qAzdPEnYGDF54JdbxobeNrgx86Jg9QKGKv+h86RzwdE+8yv9mHE=', 'ansible_ssh_host_key_rsa_public_keytype': 'ssh-rsa', 'ansible_swapfree_mb': 0, 'ansible_swaptotal_mb': 0, 'ansible_system': 'Linux', 'ansible_system_capabilities': [''], 'ansible_system_capabilities_enforced': 'True', 'ansible_system_vendor': 'OpenStack Foundation', 'ansible_uptime_seconds': 803, 'ansible_user_dir': '/home/zuul', 'ansible_user_gecos': '', 'ansible_user_gid': 1000, 'ansible_user_id': 'zuul', 'ansible_user_shell': '/bin/bash', 'ansible_user_uid': 1000, 'ansible_userspace_architecture': 'x86_64', 'ansible_userspace_bits': '64', 'ansible_virtualization_role': 'guest', 'ansible_virtualization_tech_guest': ['openstack'], 'ansible_virtualization_tech_host': ['kvm'], 'ansible_virtualization_type': 'openstack', 'cifmw_discovered_hash': '0653754d2af8079f7c677f47fa5006beb1f727ca036526ac8bf07bf53cd43e47', 'cifmw_discovered_hash_algorithm': 'sha256', 'cifmw_discovered_image_name': 'CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_discovered_image_url': 'https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2', 'cifmw_edpm_deploy_env': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_TAG': 'a0eac564d779a7eaac46c9816bff261a', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/home/zuul/ci-framework-data/nova-extra-config.conf', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_SINGLE_NODE': 'false', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['0.0.0.0/0']", 'DATAPLANE_TOTAL_NODES': 2, 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'PATH': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'SSH_KEY_FILE': '/home/zuul/.ssh/id_cifw', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_install_yamls_defaults': {'ADOPTED_EXTERNAL_NETWORK': '172.21.1.0/24', 'ADOPTED_INTERNALAPI_NETWORK': '172.17.1.0/24', 'ADOPTED_STORAGEMGMT_NETWORK': '172.20.1.0/24', 'ADOPTED_STORAGE_NETWORK': '172.18.1.0/24', 'ADOPTED_TENANT_NETWORK': '172.9.1.0/24', 'ANSIBLEEE': 'config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_BRANCH': 'main', 'ANSIBLEEE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml', 'ANSIBLEEE_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest', 'ANSIBLEEE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml', 'ANSIBLEEE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests', 'ANSIBLEEE_KUTTL_NAMESPACE': 'ansibleee-kuttl-tests', 'ANSIBLEEE_REPO': 'https://github.com/openstack-k8s-operators/openstack-ansibleee-operator', 'ANSIBLEE_COMMIT_HASH': '', 'BARBICAN': 'config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_BRANCH': 'main', 'BARBICAN_COMMIT_HASH': '', 'BARBICAN_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml', 'BARBICAN_DEPL_IMG': 'unused', 'BARBICAN_IMG': 'quay.io/openstack-k8s-operators/barbican-operator-index:latest', 'BARBICAN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml', 'BARBICAN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests', 'BARBICAN_KUTTL_NAMESPACE': 'barbican-kuttl-tests', 'BARBICAN_REPO': 'https://github.com/openstack-k8s-operators/barbican-operator.git', 'BARBICAN_SERVICE_ENABLED': 'true', 'BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY': 'sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=', 'BAREMETAL_BRANCH': 'main', 'BAREMETAL_COMMIT_HASH': '', 'BAREMETAL_IMG': 'quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest', 'BAREMETAL_OS_CONTAINER_IMG': '', 'BAREMETAL_OS_IMG': '', 'BAREMETAL_REPO': 'https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git', 'BAREMETAL_TIMEOUT': '20m', 'BASH_IMG': 'quay.io/openstack-k8s-operators/bash:latest', 'BGP_ASN': '64999', 'BGP_LEAF_1': '100.65.4.1', 'BGP_LEAF_2': '100.64.4.1', 'BGP_OVN_ROUTING': 'false', 'BGP_PEER_ASN': '64999', 'BGP_SOURCE_IP': '172.30.4.2', 'BGP_SOURCE_IP6': 'f00d:f00d:f00d:f00d:f00d:f00d:f00d:42', 'BMAAS_BRIDGE_IPV4_PREFIX': '172.20.1.2/24', 'BMAAS_BRIDGE_IPV6_PREFIX': 'fd00:bbbb::2/64', 'BMAAS_INSTANCE_DISK_SIZE': '20', 'BMAAS_INSTANCE_MEMORY': '4096', 'BMAAS_INSTANCE_NAME_PREFIX': 'crc-bmaas', 'BMAAS_INSTANCE_NET_MODEL': 'virtio', 'BMAAS_INSTANCE_OS_VARIANT': 'centos-stream9', 'BMAAS_INSTANCE_VCPUS': '2', 'BMAAS_INSTANCE_VIRT_TYPE': 'kvm', 'BMAAS_IPV4': 'true', 'BMAAS_IPV6': 'false', 'BMAAS_LIBVIRT_USER': 'sushyemu', 'BMAAS_METALLB_ADDRESS_POOL': '172.20.1.64/26', 'BMAAS_METALLB_POOL_NAME': 'baremetal', 'BMAAS_NETWORK_IPV4_PREFIX': '172.20.1.1/24', 'BMAAS_NETWORK_IPV6_PREFIX': 'fd00:bbbb::1/64', 'BMAAS_NETWORK_NAME': 'crc-bmaas', 'BMAAS_NODE_COUNT': '1', 'BMAAS_OCP_INSTANCE_NAME': 'crc', 'BMAAS_REDFISH_PASSWORD': 'password', 'BMAAS_REDFISH_USERNAME': 'admin', 'BMAAS_ROUTE_LIBVIRT_NETWORKS': 'crc-bmaas,crc,default', 'BMAAS_SUSHY_EMULATOR_DRIVER': 'libvirt', 'BMAAS_SUSHY_EMULATOR_IMAGE': 'quay.io/metal3-io/sushy-tools:latest', 'BMAAS_SUSHY_EMULATOR_NAMESPACE': 'sushy-emulator', 'BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE': '/etc/openstack/clouds.yaml', 'BMAAS_SUSHY_EMULATOR_OS_CLOUD': 'openstack', 'BMH_NAMESPACE': 'openstack', 'BMO_BRANCH': 'release-0.9', 'BMO_COMMIT_HASH': '', 'BMO_IPA_BRANCH': 'stable/2024.1', 'BMO_IRONIC_HOST': '192.168.122.10', 'BMO_PROVISIONING_INTERFACE': '', 'BMO_REPO': 'https://github.com/metal3-io/baremetal-operator', 'BMO_SETUP': False, 'BMO_SETUP_ROUTE_REPLACE': 'true', 'BM_CTLPLANE_INTERFACE': 'enp1s0', 'BM_INSTANCE_MEMORY': '8192', 'BM_INSTANCE_NAME_PREFIX': 'edpm-compute-baremetal', 'BM_INSTANCE_NAME_SUFFIX': '0', 'BM_NETWORK_NAME': 'default', 'BM_NODE_COUNT': '1', 'BM_ROOT_PASSWORD': '', 'BM_ROOT_PASSWORD_SECRET': '', 'CEILOMETER_CENTRAL_DEPL_IMG': 'unused', 'CEILOMETER_NOTIFICATION_DEPL_IMG': 'unused', 'CEPH_BRANCH': 'release-1.15', 'CEPH_CLIENT': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml', 'CEPH_COMMON': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml', 'CEPH_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml', 'CEPH_CRDS': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml', 'CEPH_IMG': 'quay.io/ceph/demo:latest-squid', 'CEPH_OP': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml', 'CEPH_REPO': 'https://github.com/rook/rook.git', 'CERTMANAGER_TIMEOUT': '300s', 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'CINDER': 'config/samples/cinder_v1beta1_cinder.yaml', 'CINDERAPI_DEPL_IMG': 'unused', 'CINDERBKP_DEPL_IMG': 'unused', 'CINDERSCH_DEPL_IMG': 'unused', 'CINDERVOL_DEPL_IMG': 'unused', 'CINDER_BRANCH': 'main', 'CINDER_COMMIT_HASH': '', 'CINDER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml', 'CINDER_IMG': 'quay.io/openstack-k8s-operators/cinder-operator-index:latest', 'CINDER_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml', 'CINDER_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests', 'CINDER_KUTTL_NAMESPACE': 'cinder-kuttl-tests', 'CINDER_REPO': 'https://github.com/openstack-k8s-operators/cinder-operator.git', 'CLEANUP_DIR_CMD': 'rm -Rf', 'CRC_BGP_NIC_1_MAC': '52:54:00:11:11:11', 'CRC_BGP_NIC_2_MAC': '52:54:00:11:11:12', 'CRC_HTTPS_PROXY': '', 'CRC_HTTP_PROXY': '', 'CRC_STORAGE_NAMESPACE': 'crc-storage', 'CRC_STORAGE_RETRIES': '3', 'CRC_URL': "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", 'CRC_VERSION': 'latest', 'DATAPLANE_ANSIBLE_SECRET': 'dataplane-ansible-ssh-private-key-secret', 'DATAPLANE_ANSIBLE_USER': '', 'DATAPLANE_COMPUTE_IP': '192.168.122.100', 'DATAPLANE_CONTAINER_PREFIX': 'openstack', 'DATAPLANE_CONTAINER_TAG': 'current-podified', 'DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG': 'quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest', 'DATAPLANE_DEFAULT_GW': '192.168.122.1', 'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': '/dev/null', 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=100%', 'DATAPLANE_KUSTOMIZE_SCENARIO': 'preprovisioned', 'DATAPLANE_NETWORKER_IP': '192.168.122.200', 'DATAPLANE_NETWORK_INTERFACE_NAME': 'eth0', 'DATAPLANE_NOVA_NFS_PATH': '', 'DATAPLANE_NTP_SERVER': 'pool.ntp.org', 'DATAPLANE_PLAYBOOK': 'osp.edpm.download_cache', 'DATAPLANE_REGISTRY_URL': 'quay.io/podified-antelope-centos9', 'DATAPLANE_RUNNER_IMG': '', 'DATAPLANE_SERVER_ROLE': 'compute', 'DATAPLANE_SSHD_ALLOWED_RANGES': "['192.168.122.0/24']", 'DATAPLANE_TIMEOUT': '30m', 'DATAPLANE_TLS_ENABLED': 'true', 'DATAPLANE_TOTAL_NETWORKER_NODES': '1', 'DATAPLANE_TOTAL_NODES': '1', 'DBSERVICE': 'galera', 'DESIGNATE': 'config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_BRANCH': 'main', 'DESIGNATE_COMMIT_HASH': '', 'DESIGNATE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml', 'DESIGNATE_IMG': 'quay.io/openstack-k8s-operators/designate-operator-index:latest', 'DESIGNATE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml', 'DESIGNATE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests', 'DESIGNATE_KUTTL_NAMESPACE': 'designate-kuttl-tests', 'DESIGNATE_REPO': 'https://github.com/openstack-k8s-operators/designate-operator.git', 'DNSDATA': 'config/samples/network_v1beta1_dnsdata.yaml', 'DNSDATA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml', 'DNSMASQ': 'config/samples/network_v1beta1_dnsmasq.yaml', 'DNSMASQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml', 'DNS_DEPL_IMG': 'unused', 'DNS_DOMAIN': 'localdomain', 'DOWNLOAD_TOOLS_SELECTION': 'all', 'EDPM_ATTACH_EXTNET': 'true', 'EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES': "'[]'", 'EDPM_COMPUTE_ADDITIONAL_NETWORKS': "'[]'", 'EDPM_COMPUTE_CELLS': '1', 'EDPM_COMPUTE_CEPH_ENABLED': 'true', 'EDPM_COMPUTE_CEPH_NOVA': 'true', 'EDPM_COMPUTE_DHCP_AGENT_ENABLED': 'true', 'EDPM_COMPUTE_SRIOV_ENABLED': 'true', 'EDPM_COMPUTE_SUFFIX': '0', 'EDPM_CONFIGURE_DEFAULT_ROUTE': 'true', 'EDPM_CONFIGURE_HUGEPAGES': 'false', 'EDPM_CONFIGURE_NETWORKING': 'true', 'EDPM_FIRSTBOOT_EXTRA': '/tmp/edpm-firstboot-extra', 'EDPM_NETWORKER_SUFFIX': '0', 'EDPM_TOTAL_NETWORKERS': '1', 'EDPM_TOTAL_NODES': '1', 'GALERA_REPLICAS': '', 'GENERATE_SSH_KEYS': 'true', 'GIT_CLONE_OPTS': '', 'GLANCE': 'config/samples/glance_v1beta1_glance.yaml', 'GLANCEAPI_DEPL_IMG': 'unused', 'GLANCE_BRANCH': 'main', 'GLANCE_COMMIT_HASH': '', 'GLANCE_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml', 'GLANCE_IMG': 'quay.io/openstack-k8s-operators/glance-operator-index:latest', 'GLANCE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml', 'GLANCE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests', 'GLANCE_KUTTL_NAMESPACE': 'glance-kuttl-tests', 'GLANCE_REPO': 'https://github.com/openstack-k8s-operators/glance-operator.git', 'HEAT': 'config/samples/heat_v1beta1_heat.yaml', 'HEATAPI_DEPL_IMG': 'unused', 'HEATCFNAPI_DEPL_IMG': 'unused', 'HEATENGINE_DEPL_IMG': 'unused', 'HEAT_AUTH_ENCRYPTION_KEY': '767c3ed056cbaa3b9dfedb8c6f825bf0', 'HEAT_BRANCH': 'main', 'HEAT_COMMIT_HASH': '', 'HEAT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml', 'HEAT_IMG': 'quay.io/openstack-k8s-operators/heat-operator-index:latest', 'HEAT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml', 'HEAT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests', 'HEAT_KUTTL_NAMESPACE': 'heat-kuttl-tests', 'HEAT_REPO': 'https://github.com/openstack-k8s-operators/heat-operator.git', 'HEAT_SERVICE_ENABLED': 'true', 'HORIZON': 'config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_BRANCH': 'main', 'HORIZON_COMMIT_HASH': '', 'HORIZON_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml', 'HORIZON_DEPL_IMG': 'unused', 'HORIZON_IMG': 'quay.io/openstack-k8s-operators/horizon-operator-index:latest', 'HORIZON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml', 'HORIZON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests', 'HORIZON_KUTTL_NAMESPACE': 'horizon-kuttl-tests', 'HORIZON_REPO': 'https://github.com/openstack-k8s-operators/horizon-operator.git', 'INFRA_BRANCH': 'main', 'INFRA_COMMIT_HASH': '', 'INFRA_IMG': 'quay.io/openstack-k8s-operators/infra-operator-index:latest', 'INFRA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml', 'INFRA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests', 'INFRA_KUTTL_NAMESPACE': 'infra-kuttl-tests', 'INFRA_REPO': 'https://github.com/openstack-k8s-operators/infra-operator.git', 'INSTALL_CERT_MANAGER': False, 'INSTALL_NMSTATE': 'true || false', 'INSTALL_NNCP': 'true || false', 'INTERNALAPI_HOST_ROUTES': '', 'IPV6_LAB_IPV4_NETWORK_IPADDRESS': '172.30.0.1/24', 'IPV6_LAB_IPV6_NETWORK_IPADDRESS': 'fd00:abcd:abcd:fc00::1/64', 'IPV6_LAB_LIBVIRT_STORAGE_POOL': 'default', 'IPV6_LAB_MANAGE_FIREWALLD': 'true', 'IPV6_LAB_NAT64_HOST_IPV4': '172.30.0.2/24', 'IPV6_LAB_NAT64_HOST_IPV6': 'fd00:abcd:abcd:fc00::2/64', 'IPV6_LAB_NAT64_INSTANCE_NAME': 'nat64-router', 'IPV6_LAB_NAT64_IPV6_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL': '192.168.255.0/24', 'IPV6_LAB_NAT64_TAYGA_IPV4': '192.168.255.1', 'IPV6_LAB_NAT64_TAYGA_IPV6': 'fd00:abcd:abcd:fc00::3', 'IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX': 'fd00:abcd:abcd:fcff::/96', 'IPV6_LAB_NAT64_UPDATE_PACKAGES': 'false', 'IPV6_LAB_NETWORK_NAME': 'nat64', 'IPV6_LAB_SNO_CLUSTER_NETWORK': 'fd00:abcd:0::/48', 'IPV6_LAB_SNO_HOST_IP': 'fd00:abcd:abcd:fc00::11', 'IPV6_LAB_SNO_HOST_PREFIX': '64', 'IPV6_LAB_SNO_INSTANCE_NAME': 'sno', 'IPV6_LAB_SNO_MACHINE_NETWORK': 'fd00:abcd:abcd:fc00::/64', 'IPV6_LAB_SNO_OCP_MIRROR_URL': 'https://mirror.openshift.com/pub/openshift-v4/clients/ocp', 'IPV6_LAB_SNO_OCP_VERSION': 'latest-4.14', 'IPV6_LAB_SNO_SERVICE_NETWORK': 'fd00:abcd:abcd:fc03::/112', 'IPV6_LAB_SSH_PUB_KEY': '/home/zuul/.ssh/id_rsa.pub', 'IPV6_LAB_WORK_DIR': '/home/zuul/.ipv6lab', 'IRONIC': 'config/samples/ironic_v1beta1_ironic.yaml', 'IRONICAPI_DEPL_IMG': 'unused', 'IRONICCON_DEPL_IMG': 'unused', 'IRONICINS_DEPL_IMG': 'unused', 'IRONICNAG_DEPL_IMG': 'unused', 'IRONICPXE_DEPL_IMG': 'unused', 'IRONIC_BRANCH': 'main', 'IRONIC_COMMIT_HASH': '', 'IRONIC_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml', 'IRONIC_IMAGE_TAG': 'release-24.1', 'IRONIC_IMG': 'quay.io/openstack-k8s-operators/ironic-operator-index:latest', 'IRONIC_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml', 'IRONIC_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests', 'IRONIC_KUTTL_NAMESPACE': 'ironic-kuttl-tests', 'IRONIC_REPO': 'https://github.com/openstack-k8s-operators/ironic-operator.git', 'KEYSTONEAPI': 'config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml', 'KEYSTONEAPI_DEPL_IMG': 'unused', 'KEYSTONE_BRANCH': 'main', 'KEYSTONE_COMMIT_HASH': '', 'KEYSTONE_FEDERATION_CLIENT_SECRET': 'COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f', 'KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE': 'openstack', 'KEYSTONE_IMG': 'quay.io/openstack-k8s-operators/keystone-operator-index:latest', 'KEYSTONE_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml', 'KEYSTONE_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests', 'KEYSTONE_KUTTL_NAMESPACE': 'keystone-kuttl-tests', 'KEYSTONE_REPO': 'https://github.com/openstack-k8s-operators/keystone-operator.git', 'KUBEADMIN_PWD': '12345678', 'LIBVIRT_SECRET': 'libvirt-secret', 'LOKI_DEPLOY_MODE': 'openshift-network', 'LOKI_DEPLOY_NAMESPACE': 'netobserv', 'LOKI_DEPLOY_SIZE': '1x.demo', 'LOKI_NAMESPACE': 'openshift-operators-redhat', 'LOKI_OPERATOR_GROUP': 'openshift-operators-redhat-loki', 'LOKI_SUBSCRIPTION': 'loki-operator', 'LVMS_CR': '1', 'MANILA': 'config/samples/manila_v1beta1_manila.yaml', 'MANILAAPI_DEPL_IMG': 'unused', 'MANILASCH_DEPL_IMG': 'unused', 'MANILASHARE_DEPL_IMG': 'unused', 'MANILA_BRANCH': 'main', 'MANILA_COMMIT_HASH': '', 'MANILA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml', 'MANILA_IMG': 'quay.io/openstack-k8s-operators/manila-operator-index:latest', 'MANILA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml', 'MANILA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests', 'MANILA_KUTTL_NAMESPACE': 'manila-kuttl-tests', 'MANILA_REPO': 'https://github.com/openstack-k8s-operators/manila-operator.git', 'MANILA_SERVICE_ENABLED': 'true', 'MARIADB': 'config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_BRANCH': 'main', 'MARIADB_CHAINSAW_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml', 'MARIADB_CHAINSAW_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests', 'MARIADB_CHAINSAW_NAMESPACE': 'mariadb-chainsaw-tests', 'MARIADB_COMMIT_HASH': '', 'MARIADB_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml', 'MARIADB_DEPL_IMG': 'unused', 'MARIADB_IMG': 'quay.io/openstack-k8s-operators/mariadb-operator-index:latest', 'MARIADB_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml', 'MARIADB_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests', 'MARIADB_KUTTL_NAMESPACE': 'mariadb-kuttl-tests', 'MARIADB_REPO': 'https://github.com/openstack-k8s-operators/mariadb-operator.git', 'MEMCACHED': 'config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml', 'MEMCACHED_DEPL_IMG': 'unused', 'METADATA_SHARED_SECRET': '1234567842', 'METALLB_IPV6_POOL': 'fd00:aaaa::80-fd00:aaaa::90', 'METALLB_POOL': '192.168.122.80-192.168.122.90', 'MICROSHIFT': '0', 'NAMESPACE': 'openstack', 'NETCONFIG': 'config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml', 'NETCONFIG_DEPL_IMG': 'unused', 'NETOBSERV_DEPLOY_NAMESPACE': 'netobserv', 'NETOBSERV_NAMESPACE': 'openshift-netobserv-operator', 'NETOBSERV_OPERATOR_GROUP': 'openshift-netobserv-operator-net', 'NETOBSERV_SUBSCRIPTION': 'netobserv-operator', 'NETWORK_BGP': 'false', 'NETWORK_DESIGNATE_ADDRESS_PREFIX': '172.28.0', 'NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX': '172.50.0', 'NETWORK_INTERNALAPI_ADDRESS_PREFIX': '172.17.0', 'NETWORK_ISOLATION': 'true', 'NETWORK_ISOLATION_INSTANCE_NAME': 'crc', 'NETWORK_ISOLATION_IPV4': 'true', 'NETWORK_ISOLATION_IPV4_ADDRESS': '172.16.1.1/24', 'NETWORK_ISOLATION_IPV4_NAT': 'true', 'NETWORK_ISOLATION_IPV6': 'false', 'NETWORK_ISOLATION_IPV6_ADDRESS': 'fd00:aaaa::1/64', 'NETWORK_ISOLATION_IP_ADDRESS': '192.168.122.10', 'NETWORK_ISOLATION_MAC': '52:54:00:11:11:10', 'NETWORK_ISOLATION_NETWORK_NAME': 'net-iso', 'NETWORK_ISOLATION_NET_NAME': 'default', 'NETWORK_ISOLATION_USE_DEFAULT_NETWORK': 'true', 'NETWORK_MTU': '1500', 'NETWORK_STORAGEMGMT_ADDRESS_PREFIX': '172.20.0', 'NETWORK_STORAGE_ADDRESS_PREFIX': '172.18.0', 'NETWORK_STORAGE_MACVLAN': '', 'NETWORK_TENANT_ADDRESS_PREFIX': '172.19.0', 'NETWORK_VLAN_START': '20', 'NETWORK_VLAN_STEP': '1', 'NEUTRONAPI': 'config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml', 'NEUTRONAPI_DEPL_IMG': 'unused', 'NEUTRON_BRANCH': 'main', 'NEUTRON_COMMIT_HASH': '', 'NEUTRON_IMG': 'quay.io/openstack-k8s-operators/neutron-operator-index:latest', 'NEUTRON_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml', 'NEUTRON_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests', 'NEUTRON_KUTTL_NAMESPACE': 'neutron-kuttl-tests', 'NEUTRON_REPO': 'https://github.com/openstack-k8s-operators/neutron-operator.git', 'NFS_HOME': '/home/nfs', 'NMSTATE_NAMESPACE': 'openshift-nmstate', 'NMSTATE_OPERATOR_GROUP': 'openshift-nmstate-tn6k8', 'NMSTATE_SUBSCRIPTION': 'kubernetes-nmstate-operator', 'NNCP_ADDITIONAL_HOST_ROUTES': '', 'NNCP_BGP_1_INTERFACE': 'enp7s0', 'NNCP_BGP_1_IP_ADDRESS': '100.65.4.2', 'NNCP_BGP_2_INTERFACE': 'enp8s0', 'NNCP_BGP_2_IP_ADDRESS': '100.64.4.2', 'NNCP_BRIDGE': 'ospbr', 'NNCP_CLEANUP_TIMEOUT': '120s', 'NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX': 'fd00:aaaa::', 'NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX': '10', 'NNCP_CTLPLANE_IP_ADDRESS_PREFIX': '192.168.122', 'NNCP_CTLPLANE_IP_ADDRESS_SUFFIX': '10', 'NNCP_DNS_SERVER': '192.168.122.1', 'NNCP_DNS_SERVER_IPV6': 'fd00:aaaa::1', 'NNCP_GATEWAY': '192.168.122.1', 'NNCP_GATEWAY_IPV6': 'fd00:aaaa::1', 'NNCP_INTERFACE': 'enp6s0', 'NNCP_NODES': '', 'NNCP_TIMEOUT': '240s', 'NOVA': 'config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_BRANCH': 'main', 'NOVA_COMMIT_HASH': '', 'NOVA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml', 'NOVA_IMG': 'quay.io/openstack-k8s-operators/nova-operator-index:latest', 'NOVA_REPO': 'https://github.com/openstack-k8s-operators/nova-operator.git', 'NUMBER_OF_INSTANCES': '1', 'OCP_NETWORK_NAME': 'crc', 'OCTAVIA': 'config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_BRANCH': 'main', 'OCTAVIA_COMMIT_HASH': '', 'OCTAVIA_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml', 'OCTAVIA_IMG': 'quay.io/openstack-k8s-operators/octavia-operator-index:latest', 'OCTAVIA_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml', 'OCTAVIA_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests', 'OCTAVIA_KUTTL_NAMESPACE': 'octavia-kuttl-tests', 'OCTAVIA_REPO': 'https://github.com/openstack-k8s-operators/octavia-operator.git', 'OKD': 'false', 'OPENSTACK_BRANCH': 'main', 'OPENSTACK_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-bundle:latest', 'OPENSTACK_COMMIT_HASH': '', 'OPENSTACK_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_CRDS_DIR': 'openstack_crds', 'OPENSTACK_CTLPLANE': 'config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml', 'OPENSTACK_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-index:latest', 'OPENSTACK_K8S_BRANCH': 'main', 'OPENSTACK_K8S_TAG': 'latest', 'OPENSTACK_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml', 'OPENSTACK_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests', 'OPENSTACK_KUTTL_NAMESPACE': 'openstack-kuttl-tests', 'OPENSTACK_NEUTRON_CUSTOM_CONF': '', 'OPENSTACK_REPO': 'https://github.com/openstack-k8s-operators/openstack-operator.git', 'OPENSTACK_STORAGE_BUNDLE_IMG': 'quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest', 'OPERATOR_BASE_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator', 'OPERATOR_CHANNEL': '', 'OPERATOR_NAMESPACE': 'openstack-operators', 'OPERATOR_SOURCE': '', 'OPERATOR_SOURCE_NAMESPACE': '', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'OVNCONTROLLER': 'config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml', 'OVNCONTROLLER_NMAP': 'true', 'OVNDBS': 'config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNDBS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml', 'OVNNORTHD': 'config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVNNORTHD_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml', 'OVN_BRANCH': 'main', 'OVN_COMMIT_HASH': '', 'OVN_IMG': 'quay.io/openstack-k8s-operators/ovn-operator-index:latest', 'OVN_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml', 'OVN_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests', 'OVN_KUTTL_NAMESPACE': 'ovn-kuttl-tests', 'OVN_REPO': 'https://github.com/openstack-k8s-operators/ovn-operator.git', 'PASSWORD': '12345678', 'PLACEMENTAPI': 'config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml', 'PLACEMENTAPI_DEPL_IMG': 'unused', 'PLACEMENT_BRANCH': 'main', 'PLACEMENT_COMMIT_HASH': '', 'PLACEMENT_IMG': 'quay.io/openstack-k8s-operators/placement-operator-index:latest', 'PLACEMENT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml', 'PLACEMENT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests', 'PLACEMENT_KUTTL_NAMESPACE': 'placement-kuttl-tests', 'PLACEMENT_REPO': 'https://github.com/openstack-k8s-operators/placement-operator.git', 'PULL_SECRET': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt', 'RABBITMQ': 'docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_BRANCH': 'patches', 'RABBITMQ_COMMIT_HASH': '', 'RABBITMQ_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml', 'RABBITMQ_DEPL_IMG': 'unused', 'RABBITMQ_IMG': 'quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest', 'RABBITMQ_REPO': 'https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git', 'REDHAT_OPERATORS': 'false', 'REDIS': 'config/samples/redis_v1beta1_redis.yaml', 'REDIS_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml', 'REDIS_DEPL_IMG': 'unused', 'RH_REGISTRY_PWD': '', 'RH_REGISTRY_USER': '', 'SECRET': 'osp-secret', 'SG_CORE_DEPL_IMG': 'unused', 'STANDALONE_COMPUTE_DRIVER': 'libvirt', 'STANDALONE_EXTERNAL_NET_PREFFIX': '172.21.0', 'STANDALONE_INTERNALAPI_NET_PREFIX': '172.17.0', 'STANDALONE_STORAGEMGMT_NET_PREFIX': '172.20.0', 'STANDALONE_STORAGE_NET_PREFIX': '172.18.0', 'STANDALONE_TENANT_NET_PREFIX': '172.19.0', 'STORAGEMGMT_HOST_ROUTES': '', 'STORAGE_CLASS': 'local-storage', 'STORAGE_HOST_ROUTES': '', 'SWIFT': 'config/samples/swift_v1beta1_swift.yaml', 'SWIFT_BRANCH': 'main', 'SWIFT_COMMIT_HASH': '', 'SWIFT_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml', 'SWIFT_IMG': 'quay.io/openstack-k8s-operators/swift-operator-index:latest', 'SWIFT_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml', 'SWIFT_KUTTL_DIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests', 'SWIFT_KUTTL_NAMESPACE': 'swift-kuttl-tests', 'SWIFT_REPO': 'https://github.com/openstack-k8s-operators/swift-operator.git', 'TELEMETRY': 'config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_BRANCH': 'main', 'TELEMETRY_COMMIT_HASH': '', 'TELEMETRY_CR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml', 'TELEMETRY_IMG': 'quay.io/openstack-k8s-operators/telemetry-operator-index:latest', 'TELEMETRY_KUTTL_BASEDIR': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator', 'TELEMETRY_KUTTL_CONF': '/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml', 'TELEMETRY_KUTTL_NAMESPACE': 'telemetry-kuttl-tests', 'TELEMETRY_KUTTL_RELPATH': 'tests/kuttl/suites', 'TELEMETRY_REPO': 'https://github.com/openstack-k8s-operators/telemetry-operator.git', 'TENANT_HOST_ROUTES': '', 'TIMEOUT': '300s', 'TLS_ENABLED': 'false', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'tripleo_deploy': 'export REGISTRY_PWD:'}, 'cifmw_install_yamls_environment': {'BMO_SETUP': False, 'CHECKOUT_FROM_OPENSTACK_REF': 'true', 'INSTALL_CERT_MANAGER': False, 'KUBECONFIG': '/home/zuul/.crc/machines/crc/kubeconfig', 'OPENSTACK_K8S_BRANCH': 'main', 'OUT': '/home/zuul/ci-framework-data/artifacts/manifests', 'OUTPUT_DIR': '/home/zuul/ci-framework-data/artifacts/edpm', 'WATCHER_BRANCH': '', 'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, 'cifmw_openshift_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_login_api': 'https://api.crc.testing:6443', 'cifmw_openshift_login_cert_login': False, 'cifmw_openshift_login_context': 'default/api-crc-testing:6443/kubeadmin', 'cifmw_openshift_login_kubeconfig': '/home/zuul/.crc/machines/crc/kubeconfig', 'cifmw_openshift_login_password': 123456789, 'cifmw_openshift_login_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_openshift_login_user': 'kubeadmin', 'cifmw_openshift_token': 'sha256~hp6e_EBgprH9ka057TE8mH1sfj2O3egv5dzd0XeTPa4', 'cifmw_path': '/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin', 'cifmw_repo_setup_commit_hash': None, 'cifmw_repo_setup_distro_hash': None, 'cifmw_repo_setup_dlrn_api_url': 'https://trunk.rdoproject.org/api-centos9-antelope', 'cifmw_repo_setup_dlrn_url': 'https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5', 'cifmw_repo_setup_extended_hash': None, 'cifmw_repo_setup_full_hash': 'a0eac564d779a7eaac46c9816bff261a', 'cifmw_repo_setup_release': 'antelope', 'discovered_interpreter_python': '/usr/bin/python3', 'gather_subset': ['all'], 'module_setup': True, 'cifmw_basedir': '/home/zuul/ci-framework-data', 'cifmw_config_certmanager': True, 'cifmw_deploy_edpm': True, 'cifmw_edpm_prepare_kustomizations': [{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'namespace': 'openstack', 'patches': [{'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n monitoringStack: null', 'target': {'kind': 'OpenStackControlPlane'}}, {'patch': 'apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60', 'target': {'kind': 'OpenStackControlPlane'}}]}], 'cifmw_edpm_prepare_skip_crc_storage_creation': True, 'cifmw_edpm_prepare_timeout': 60, 'cifmw_installyamls_repos': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls', 'cifmw_openshift_setup_skip_internal_registry': True, 'cifmw_openshift_setup_skip_internal_registry_tls_verify': True, 'cifmw_operator_build_meta_name': 'openstack-operator', 'cifmw_repo_setup_dist_major_version': 9, 'cifmw_repo_setup_os_release': 'centos', 'cifmw_run_test_role': 'test_operator', 'cifmw_run_tests': True, 'cifmw_test_operator_tempest_concurrency': 1, 'cifmw_test_operator_tempest_exclude_list': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n', 'cifmw_test_operator_tempest_include_list': 'watcher_tempest_plugin.*\n', 'cifmw_test_operator_tempest_tempestconf_config': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}, 'cifmw_update_containers': True, 'cifmw_use_crc': False, 'post_ctlplane_deploy': [{'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}], 'post_deploy': [{'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}, {'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}], 'post_infra': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], 'pre_deploy': [{'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}], 'pre_deploy_create_coo_subscription': [{'name': 'Deploy cluster-observability-operator', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}], 'pre_infra': [{'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}], 'pre_update': [{'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}], '_stage_var_file': {}, 'csv_info': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}, 'image_index': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}, 'pod_info': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}, 'pod_list': {'changed': False, 'skipped': True, 'skip_reason': 'Conditional result was False', 'false_condition': 'cifmw_test_operator_bundle != ""'}, 'stage_vars_dict': {}, '_stage_test_vars': {}, 'cifmw_install_yamls_vars': {'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}, 'watcher_repo': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'watcher_coo_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml', 'prometheus_admin_api_hook': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml', 'cifmw_install_yamls_whitelisted_vars': ['WATCHER_REPO', 'WATCHER_BRANCH', 'OUTPUT_DIR'], 'run_tempest': False, 'playbook_dir': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework', 'ansible_playbook_python': '/usr/bin/python3', 'ansible_config_file': '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg', 'groups': {'all': ['compute-0', 'compute-1', 'controller', 'crc', 'localhost'], 'ungrouped': ['controller', 'localhost'], 'computes': ['compute-0', 'compute-1'], 'ocps': ['crc'], 'zuul_unreachable': []}, 'omit': '__omit_place_holder__611155ab13a88ca5d403f168c1e62ffaa0231aef', 'ansible_version': {'string': '2.15.13', 'full': '2.15.13', 'major': 2, 'minor': 15, 'revision': 13}, 'ansible_check_mode': False, 'ansible_diff_mode': False, 'ansible_forks': 5, 'ansible_inventory_sources': ['/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml'], 'ansible_skip_tags': [], 'ansible_run_tags': ['all'], 'ansible_verbosity': 0}}}) 2025-10-02 12:06:52,074 p=33391 u=zuul n=ansible | skipping: [localhost] => (item={'key': 'environment', 'value': []}) 2025-10-02 12:06:52,228 p=33391 u=zuul n=ansible | TASK [test_operator : Override specific type config stage_vars_dict={{ stage_vars_dict | combine({_stage_config: _stage_test_vars[_stage_config] | default(lookup('vars', _stage_config, default=omit)) }) }}] *** 2025-10-02 12:06:52,228 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:03.813) 0:00:36.022 ****** 2025-10-02 12:06:52,284 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:52,299 p=33391 u=zuul n=ansible | TASK [test_operator : Call runner tempest _raw_params=runners/{{ _stage_vars.type }}_runner.yml] *** 2025-10-02 12:06:52,299 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.070) 0:00:36.093 ****** 2025-10-02 12:06:52,327 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/runners/tempest_runner.yml for localhost 2025-10-02 12:06:52,347 p=33391 u=zuul n=ansible | TASK [test_operator : Run tempest job _raw_params=run-test-operator-job.yml] *** 2025-10-02 12:06:52,347 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.047) 0:00:36.141 ****** 2025-10-02 12:06:52,388 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/run-test-operator-job.yml for localhost 2025-10-02 12:06:52,403 p=33391 u=zuul n=ansible | TASK [test_operator : Set variable containing the test-operator CR test_operator_cr={{ test_operator_config }}] *** 2025-10-02 12:06:52,403 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.056) 0:00:36.198 ****** 2025-10-02 12:06:52,426 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:52,438 p=33391 u=zuul n=ansible | TASK [test_operator : Prepare test configuration - tempest _raw_params={{ test_operator_config_playbook }}] *** 2025-10-02 12:06:52,439 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.035) 0:00:36.233 ****** 2025-10-02 12:06:52,487 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/tempest-tests.yml for localhost 2025-10-02 12:06:52,509 p=33391 u=zuul n=ansible | TASK [test_operator : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2025-10-02 12:06:52,509 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.070) 0:00:36.304 ****** 2025-10-02 12:06:52,534 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,545 p=33391 u=zuul n=ansible | TASK [test_operator : Get list of tests to be executed yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_test_operator_default_groups }}, job={{ cifmw_test_operator_instance_name | default(omit) }}] *** 2025-10-02 12:06:52,545 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.035) 0:00:36.339 ****** 2025-10-02 12:06:52,572 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,582 p=33391 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'includeList': allowed_tests }}}, recursive=true) }}] *** 2025-10-02 12:06:52,582 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.037) 0:00:36.377 ****** 2025-10-02 12:06:52,608 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,625 p=33391 u=zuul n=ansible | TASK [test_operator : Copy list_skipped to artifacts dir dest={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml, mode=0644] *** 2025-10-02 12:06:52,625 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.042) 0:00:36.419 ****** 2025-10-02 12:06:52,650 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,661 p=33391 u=zuul n=ansible | TASK [test_operator : Get list of tests to be excluded yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_test_operator_default_jobs }}] *** 2025-10-02 12:06:52,661 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.036) 0:00:36.456 ****** 2025-10-02 12:06:52,687 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,697 p=33391 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'excludeList': skipped_tests }}}, recursive=true) }}] *** 2025-10-02 12:06:52,697 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.036) 0:00:36.492 ****** 2025-10-02 12:06:52,725 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:52,737 p=33391 u=zuul n=ansible | TASK [test_operator : Check that cifmw private key file exists path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2025-10-02 12:06:52,737 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:52 +0000 (0:00:00.039) 0:00:36.531 ****** 2025-10-02 12:06:53,072 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:53,086 p=33391 u=zuul n=ansible | TASK [test_operator : Slurp cifmw private key file path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2025-10-02 12:06:53,087 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:53 +0000 (0:00:00.349) 0:00:36.881 ****** 2025-10-02 12:06:53,378 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:53,391 p=33391 u=zuul n=ansible | TASK [test_operator : Ensure a secret for the cifmw private key file exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, wait=True, definition={'apiVersion': 'v1', 'kind': 'Secret', 'type': 'Opaque', 'metadata': {'name': '{{ cifmw_test_operator_controller_priv_key_secret_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'data': {'ssh-privatekey': '{{ private_key_file_content.content }}'}}] *** 2025-10-02 12:06:53,391 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:53 +0000 (0:00:00.304) 0:00:37.186 ****** 2025-10-02 12:06:54,394 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:54,404 p=33391 u=zuul n=ansible | TASK [test_operator : Add SSHKeySecretName section to Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'SSHKeySecretName': cifmw_test_operator_controller_priv_key_secret_name }}, recursive=true) }}] *** 2025-10-02 12:06:54,405 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:01.013) 0:00:38.199 ****** 2025-10-02 12:06:54,434 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:54,445 p=33391 u=zuul n=ansible | TASK [test_operator : Add controller IP to the overrides section in Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestconfRun': {'overrides': (test_operator_cr.spec.tempestconfRun.overrides | default('')) + ' ' + 'whitebox_neutron_plugin_options.proxy_host_address ' + controller_ip }}}, recursive=true) }}] *** 2025-10-02 12:06:54,445 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.040) 0:00:38.239 ****** 2025-10-02 12:06:54,472 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:06:54,482 p=33391 u=zuul n=ansible | TASK [test_operator : Add controller IP to each workflow step overrides section - Create overriden_workflow overriden_workflow={{ overriden_workflow | default([]) + [_overriden_workflow_step] }}] *** 2025-10-02 12:06:54,482 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.037) 0:00:38.277 ****** 2025-10-02 12:06:54,498 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:54,511 p=33391 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': overriden_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': overriden_workflow}) }}] *** 2025-10-02 12:06:54,511 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.028) 0:00:38.305 ****** 2025-10-02 12:06:54,539 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:54,550 p=33391 u=zuul n=ansible | TASK [test_operator : Remove resources until fix for bug 2088074 reaches openstack-tempest-all image no_resources_workflow={{ no_resources_workflow | default([]) + [_no_resources_workflow_step] }}] *** 2025-10-02 12:06:54,550 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.039) 0:00:38.344 ****** 2025-10-02 12:06:54,565 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:54,579 p=33391 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': no_resources_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': no_resources_workflow}) }}] *** 2025-10-02 12:06:54,579 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.029) 0:00:38.374 ****** 2025-10-02 12:06:54,606 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:06:54,617 p=33391 u=zuul n=ansible | TASK [test_operator : Print CR before applying msg={{ test_operator_cr }}] ***** 2025-10-02 12:06:54,617 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.037) 0:00:38.412 ****** 2025-10-02 12:06:54,642 p=33391 u=zuul n=ansible | ok: [localhost] => msg: apiVersion: test.openstack.org/v1beta1 kind: Tempest metadata: name: tempest-tests-tempest namespace: openstack spec: SELinuxLevel: s0:c478,c978 SSHKeySecretName: test-operator-controller-priv-key cleanup: false containerImage: 38.129.56.134:5001/podified-epoxy-centos9/openstack-tempest-all:watcher_latest debug: false networkAttachments: [] privileged: true rerunFailedTests: false rerunOverrideStatus: false resources: limits: {} requests: {} storageClass: local-storage tempestRun: concurrency: 1 excludeList: | watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* expectedFailuresList: |2+ externalPlugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git extraImages: [] extraRPMs: [] includeList: | watcher_tempest_plugin.* tempestconfRun: deployerInput: | [auth] tempest_roles = [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true [compute-feature-enabled] dhcp_domain = '' [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false [volume] catalog_type = volumev3 overrides: |- compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.234 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true whitebox_neutron_plugin_options.proxy_host_address 38.102.83.234 workflow: [] 2025-10-02 12:06:54,653 p=33391 u=zuul n=ansible | TASK [test_operator : Make sure test-operator CR directory exists path={{ cifmw_test_operator_crs_path }}, state=directory, mode=0755] *** 2025-10-02 12:06:54,653 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.036) 0:00:38.448 ****** 2025-10-02 12:06:54,880 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:54,894 p=33391 u=zuul n=ansible | TASK [test_operator : Write test-operator CR to file content={{ test_operator_cr }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml, mode=0644] *** 2025-10-02 12:06:54,894 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:54 +0000 (0:00:00.240) 0:00:38.689 ****** 2025-10-02 12:06:55,525 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:55,538 p=33391 u=zuul n=ansible | TASK [test_operator : Start tests - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml] *** 2025-10-02 12:06:55,538 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:55 +0000 (0:00:00.643) 0:00:39.332 ****** 2025-10-02 12:06:56,420 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:06:56,433 p=33391 u=zuul n=ansible | TASK [test_operator : Wait for the last Pod to be Completed - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['workflowStep={{ [(test_operator_workflow | length) - 1, 0] | max }}', 'instanceName={{ test_operator_instance_name }}']] *** 2025-10-02 12:06:56,433 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:06:56 +0000 (0:00:00.895) 0:00:40.228 ****** 2025-10-02 12:49:57,184 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:49:57,199 p=33391 u=zuul n=ansible | TASK [test_operator : Check whether timed out - tempest testpod_timed_out={{ testpod.attempts == (cifmw_test_operator_timeout / 10) | round | int }}] *** 2025-10-02 12:49:57,200 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:57 +0000 (0:43:00.766) 0:43:40.994 ****** 2025-10-02 12:49:57,231 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:49:57,243 p=33391 u=zuul n=ansible | TASK [test_operator : Collect logs _raw_params=collect-logs.yaml] ************** 2025-10-02 12:49:57,243 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:57 +0000 (0:00:00.043) 0:43:41.038 ****** 2025-10-02 12:49:57,280 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/collect-logs.yaml for localhost 2025-10-02 12:49:57,299 p=33391 u=zuul n=ansible | TASK [test_operator : Reset volumes and volume_mounts to an empty list _test_operator_volumes=[], _test_operator_volume_mounts=[]] *** 2025-10-02 12:49:57,299 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:57 +0000 (0:00:00.055) 0:43:41.093 ****** 2025-10-02 12:49:57,322 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:49:57,335 p=33391 u=zuul n=ansible | TASK [test_operator : Get information about PVCs that store the logs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=PersistentVolumeClaim, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2025-10-02 12:49:57,335 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:57 +0000 (0:00:00.036) 0:43:41.129 ****** 2025-10-02 12:49:58,254 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:49:58,266 p=33391 u=zuul n=ansible | TASK [test_operator : Set up volume mounts and volumes for all PVCs _test_operator_volume_mounts={{ (_test_operator_volume_mounts | default([])) + [{ 'name': "logs-volume-" ~ index, 'mountPath': "/mnt/logs-{{ test_operator_instance_name }}-step-" ~ index }] }} , _test_operator_volumes={{ (_test_operator_volumes | default([])) + [{ 'name': "logs-volume-" ~ index, 'persistentVolumeClaim': { 'claimName': pvc.metadata.name } }] }} ] *** 2025-10-02 12:49:58,266 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:58 +0000 (0:00:00.930) 0:43:42.060 ****** 2025-10-02 12:49:58,309 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-98d72', 'namespace': 'openstack', 'uid': '9b1b9ae1-9032-4267-b614-d97fead93352', 'resourceVersion': '60852', 'creationTimestamp': '2025-10-02T12:06:56Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '66de033a-42dc-4b3f-a0b3-a767fabb00cd', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"66de033a-42dc-4b3f-a0b3-a767fabb00cd"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage10-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2025-10-02 12:49:58,325 p=33391 u=zuul n=ansible | TASK [test_operator : Write log pod definition to file content={{ cifmw_test_operator_log_pod_definition }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml, mode=0644] *** 2025-10-02 12:49:58,325 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:58 +0000 (0:00:00.059) 0:43:42.119 ****** 2025-10-02 12:49:58,854 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:49:58,872 p=33391 u=zuul n=ansible | TASK [test_operator : Start test-operator-logs-pod kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml] *** 2025-10-02 12:49:58,873 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:49:58 +0000 (0:00:00.547) 0:43:42.667 ****** 2025-10-02 12:50:04,736 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:04,752 p=33391 u=zuul n=ansible | TASK [test_operator : Ensure that the test-operator-logs-pod is Running kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, name=test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}, wait=True] *** 2025-10-02 12:50:04,752 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:04 +0000 (0:00:05.879) 0:43:48.547 ****** 2025-10-02 12:50:05,610 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:05,624 p=33391 u=zuul n=ansible | TASK [test_operator : Get logs from test-operator-logs-pod _raw_params=oc cp -n {{ stage_vars_dict.cifmw_test_operator_namespace }} test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}:{{ pod_path }} {{ cifmw_test_operator_artifacts_basedir }} ] *** 2025-10-02 12:50:05,624 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:05 +0000 (0:00:00.871) 0:43:49.418 ****** 2025-10-02 12:50:06,218 p=33391 u=zuul n=ansible | changed: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-98d72', 'namespace': 'openstack', 'uid': '9b1b9ae1-9032-4267-b614-d97fead93352', 'resourceVersion': '60852', 'creationTimestamp': '2025-10-02T12:06:56Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '66de033a-42dc-4b3f-a0b3-a767fabb00cd', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2025-10-02T12:06:56Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"66de033a-42dc-4b3f-a0b3-a767fabb00cd"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage10-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2025-10-02 12:50:06,232 p=33391 u=zuul n=ansible | TASK [test_operator : Get list of all pods kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod] *** 2025-10-02 12:50:06,232 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:06 +0000 (0:00:00.608) 0:43:50.027 ****** 2025-10-02 12:50:08,200 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:08,469 p=33391 u=zuul n=ansible | TASK [test_operator : Get test results from all test pods (Success / Fail) kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2025-10-02 12:50:08,470 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:08 +0000 (0:00:02.237) 0:43:52.264 ****** 2025-10-02 12:50:09,403 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:09,426 p=33391 u=zuul n=ansible | TASK [test_operator : Get status from test pods pod_status={{ test_pod_results.resources | map(attribute='status.phase') | list | unique }}] *** 2025-10-02 12:50:09,426 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.956) 0:43:53.220 ****** 2025-10-02 12:50:09,461 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:09,473 p=33391 u=zuul n=ansible | TASK [test_operator : Check whether test pods finished successfully successful_execution={{ pod_status | length == 1 and pod_status | first == 'Succeeded' }}] *** 2025-10-02 12:50:09,473 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.047) 0:43:53.268 ****** 2025-10-02 12:50:09,506 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:09,520 p=33391 u=zuul n=ansible | TASK [test_operator : Fail fast if a pod did not succeed - tempest that=successful_execution] *** 2025-10-02 12:50:09,520 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.047) 0:43:53.315 ****** 2025-10-02 12:50:09,545 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:09,558 p=33391 u=zuul n=ansible | TASK [test_operator : Save result - tempest test_operator_results={{ test_operator_results | default({}) | combine({run_test_fw: successful_execution}) }}] *** 2025-10-02 12:50:09,559 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.038) 0:43:53.353 ****** 2025-10-02 12:50:09,587 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:09,601 p=33391 u=zuul n=ansible | TASK [test_operator : Delete test resources _raw_params=cleanup-run.yaml] ****** 2025-10-02 12:50:09,601 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.042) 0:43:53.396 ****** 2025-10-02 12:50:09,624 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:09,635 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:50:09,636 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.034) 0:43:53.430 ****** 2025-10-02 12:50:09,668 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:09,680 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:50:09,680 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.044) 0:43:53.474 ****** 2025-10-02 12:50:09,713 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:09,730 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_test_hooks _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:50:09,731 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:09 +0000 (0:00:00.050) 0:43:53.525 ****** 2025-10-02 12:50:09,994 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,019 p=33391 u=zuul n=ansible | TASK [test_operator : Fail when any tests failed that=['item.value'], success_msg={{ item.key }} tests passed, fail_msg={{ item.key }} tests failed] *** 2025-10-02 12:50:10,020 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.289) 0:43:53.814 ****** 2025-10-02 12:50:10,055 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'key': 'tempest', 'value': True}) => ansible_loop_var: item changed: false item: key: tempest value: true msg: tempest tests passed 2025-10-02 12:50:10,080 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:50:10,080 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.060) 0:43:53.875 ****** 2025-10-02 12:50:10,236 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:10,248 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:50:10,249 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.168) 0:43:54.043 ****** 2025-10-02 12:50:10,486 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:10,498 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_tests _raw_params={{ hook.type }}.yml] *** 2025-10-02 12:50:10,498 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.249) 0:43:54.293 ****** 2025-10-02 12:50:10,667 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,696 p=33391 u=zuul n=ansible | TASK [compliance : Ensure compliance folder exists path={{ cifmw_compliance_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2025-10-02 12:50:10,696 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.197) 0:43:54.490 ****** 2025-10-02 12:50:10,713 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,726 p=33391 u=zuul n=ansible | TASK [compliance : Install the compliance operator and plugin _raw_params=install.yml] *** 2025-10-02 12:50:10,726 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.030) 0:43:54.521 ****** 2025-10-02 12:50:10,744 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,757 p=33391 u=zuul n=ansible | TASK [compliance : Run compliance scans and extract results _raw_params=run_suite_scan.yml] *** 2025-10-02 12:50:10,758 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.031) 0:43:54.552 ****** 2025-10-02 12:50:10,780 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=cis) 2025-10-02 12:50:10,785 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=e8) 2025-10-02 12:50:10,790 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=high) 2025-10-02 12:50:10,794 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=moderate) 2025-10-02 12:50:10,799 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=nerc-cip) 2025-10-02 12:50:10,804 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=pci-dss) 2025-10-02 12:50:10,807 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=stig) 2025-10-02 12:50:10,808 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,819 p=33391 u=zuul n=ansible | TASK [compliance : Delete all resources created by the role _raw_params=cleanup.yml] *** 2025-10-02 12:50:10,819 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.061) 0:43:54.613 ****** 2025-10-02 12:50:10,842 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:10,890 p=33391 u=zuul n=ansible | PLAY [Run compliance scan for computes] **************************************** 2025-10-02 12:50:10,921 p=33391 u=zuul n=ansible | TASK [compliance : Install openscap-scanner and security guide name=['openscap-scanner', 'scap-security-guide'], state=present] *** 2025-10-02 12:50:10,921 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.102) 0:43:54.716 ****** 2025-10-02 12:50:10,943 p=33391 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:50:10,950 p=33391 u=zuul n=ansible | TASK [compliance : Create folder to hold scan results path={{ cifmw_compliance_compute_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2025-10-02 12:50:10,950 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.029) 0:43:54.745 ****** 2025-10-02 12:50:10,970 p=33391 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:50:10,978 p=33391 u=zuul n=ansible | TASK [compliance : Do compliance scans _raw_params=oscap xccdf eval --report {{ cifmw_compliance_compute_artifacts_basedir }}/{{ profile }}.html --profile {{ profile}} /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml] *** 2025-10-02 12:50:10,978 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:10 +0000 (0:00:00.027) 0:43:54.772 ****** 2025-10-02 12:50:11,000 p=33391 u=zuul n=ansible | skipping: [compute-0] => (item=pci-dss) 2025-10-02 12:50:11,006 p=33391 u=zuul n=ansible | skipping: [compute-0] => (item=e8) 2025-10-02 12:50:11,009 p=33391 u=zuul n=ansible | skipping: [compute-0] => (item=stig) 2025-10-02 12:50:11,011 p=33391 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:50:11,019 p=33391 u=zuul n=ansible | TASK [compliance : Set ownership on report files path={{ cifmw_compliance_compute_artifacts_basedir }}, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, recurse=True] *** 2025-10-02 12:50:11,019 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:11 +0000 (0:00:00.041) 0:43:54.814 ****** 2025-10-02 12:50:11,038 p=33391 u=zuul n=ansible | skipping: [compute-0] 2025-10-02 12:50:11,096 p=33391 u=zuul n=ansible | PLAY [Run hooks and inject status flag] **************************************** 2025-10-02 12:50:11,130 p=33391 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 12:50:11,130 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:11 +0000 (0:00:00.110) 0:43:54.924 ****** 2025-10-02 12:50:11,206 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:11,219 p=33391 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 12:50:11,219 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:11 +0000 (0:00:00.089) 0:43:55.014 ****** 2025-10-02 12:50:11,468 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:11,482 p=33391 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_end _raw_params={{ hook.type }}.yml] **** 2025-10-02 12:50:11,483 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:11 +0000 (0:00:00.263) 0:43:55.277 ****** 2025-10-02 12:50:11,717 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:11,737 p=33391 u=zuul n=ansible | TASK [Inject success flag path={{ ansible_user_dir }}/cifmw-success, state=touch, mode=0644] *** 2025-10-02 12:50:11,738 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:11 +0000 (0:00:00.254) 0:43:55.532 ****** 2025-10-02 12:50:11,953 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:12,059 p=33391 u=zuul n=ansible | PLAY [Run log related tasks] *************************************************** 2025-10-02 12:50:12,099 p=33391 u=zuul n=ansible | TASK [cifmw_setup : Ensure cifmw_basedir param is set cifmw_basedir={{ ansible_user_dir }}/ci-framework-data] *** 2025-10-02 12:50:12,099 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:12 +0000 (0:00:00.361) 0:43:55.893 ****** 2025-10-02 12:50:12,119 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:12,130 p=33391 u=zuul n=ansible | TASK [Read artifacts parameters dir and set as facts name=cifmw_helpers, tasks_from=var_dir.yml] *** 2025-10-02 12:50:12,130 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:12 +0000 (0:00:00.031) 0:43:55.924 ****** 2025-10-02 12:50:12,169 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Check directory is available path={{ provided_dir }}] **** 2025-10-02 12:50:12,169 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:12 +0000 (0:00:00.039) 0:43:55.964 ****** 2025-10-02 12:50:12,416 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:12,431 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : List available files _raw_params=ls {{ provided_dir }} ] *** 2025-10-02 12:50:12,431 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:12 +0000 (0:00:00.261) 0:43:56.225 ****** 2025-10-02 12:50:12,682 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:12,695 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2025-10-02 12:50:12,695 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:12 +0000 (0:00:00.264) 0:43:56.489 ****** 2025-10-02 12:50:12,911 p=33391 u=zuul n=ansible | ok: [localhost] => (item=None) 2025-10-02 12:50:13,088 p=33391 u=zuul n=ansible | ok: [localhost] => (item=None) 2025-10-02 12:50:13,303 p=33391 u=zuul n=ansible | ok: [localhost] => (item=None) 2025-10-02 12:50:13,492 p=33391 u=zuul n=ansible | ok: [localhost] => (item=None) 2025-10-02 12:50:13,494 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:13,504 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Call task to parse all files as fact] ******************** 2025-10-02 12:50:13,505 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:13 +0000 (0:00:00.809) 0:43:57.299 ****** 2025-10-02 12:50:13,552 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/set_dir_facts.yml for localhost => (item=(censored due to no_log)) 2025-10-02 12:50:13,554 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/set_dir_facts.yml for localhost => (item=(censored due to no_log)) 2025-10-02 12:50:13,555 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/set_dir_facts.yml for localhost => (item=(censored due to no_log)) 2025-10-02 12:50:13,556 p=33391 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/set_dir_facts.yml for localhost => (item=(censored due to no_log)) 2025-10-02 12:50:13,567 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Set files as fact] *************************************** 2025-10-02 12:50:13,567 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:13 +0000 (0:00:00.062) 0:43:57.362 ****** 2025-10-02 12:50:13,590 p=33391 u=zuul n=ansible | [WARNING]: TASK: cifmw_helpers : Set files as fact: The loop variable 'item' is already in use. You should set the `loop_var` value in the `loop_control` option for the task to something else to avoid variable collisions and unexpected behavior. 2025-10-02 12:50:13,598 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,599 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,607 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,608 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,615 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,616 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,624 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,624 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,632 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,633 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,641 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,642 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,650 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,651 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,659 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,659 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,667 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,668 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,676 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,677 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,687 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,688 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,697 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,703 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,703 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,711 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,712 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,720 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,721 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,729 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,730 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,738 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,738 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,747 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,747 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,756 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,757 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,766 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,766 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,775 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,776 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,783 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,784 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,792 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,793 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,801 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,802 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,809 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,809 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,812 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:13,823 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Set files as fact] *************************************** 2025-10-02 12:50:13,823 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:13 +0000 (0:00:00.255) 0:43:57.617 ****** 2025-10-02 12:50:13,853 p=33391 u=zuul n=ansible | [WARNING]: TASK: cifmw_helpers : Set files as fact: The loop variable 'item' is already in use. You should set the `loop_var` value in the `loop_control` option for the task to something else to avoid variable collisions and unexpected behavior. 2025-10-02 12:50:13,867 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,867 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,870 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:13,882 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Set files as fact] *************************************** 2025-10-02 12:50:13,882 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:13 +0000 (0:00:00.058) 0:43:57.676 ****** 2025-10-02 12:50:13,900 p=33391 u=zuul n=ansible | [WARNING]: TASK: cifmw_helpers : Set files as fact: The loop variable 'item' is already in use. You should set the `loop_var` value in the `loop_control` option for the task to something else to avoid variable collisions and unexpected behavior. 2025-10-02 12:50:13,906 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,907 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,915 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,915 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,918 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,919 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:13,931 p=33391 u=zuul n=ansible | TASK [cifmw_helpers : Set files as fact] *************************************** 2025-10-02 12:50:13,931 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:13 +0000 (0:00:00.049) 0:43:57.725 ****** 2025-10-02 12:50:13,956 p=33391 u=zuul n=ansible | [WARNING]: TASK: cifmw_helpers : Set files as fact: The loop variable 'item' is already in use. You should set the `loop_var` value in the `loop_control` option for the task to something else to avoid variable collisions and unexpected behavior. 2025-10-02 12:50:13,964 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,965 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,971 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,972 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,979 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,979 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,986 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,987 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,993 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:13,994 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,001 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,001 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,008 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,008 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,016 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,016 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,023 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,023 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,032 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,033 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,038 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,038 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,045 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,045 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,053 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,053 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,061 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,061 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,069 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,070 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,077 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,078 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,086 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,091 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,091 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,102 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,102 p=33391 u=zuul n=ansible | skipping: [localhost] => (item=None) 2025-10-02 12:50:14,105 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:14,125 p=33391 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 12:50:14,125 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:14 +0000 (0:00:00.194) 0:43:57.920 ****** 2025-10-02 12:50:14,149 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:14,162 p=33391 u=zuul n=ansible | TASK [cifmw_setup : Set destination folder for the logs logfiles_dest_dir={{ ( cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data'), 'logs/', now(fmt='%Y-%m-%d_%H-%M') ) | path_join }}] *** 2025-10-02 12:50:14,162 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:14 +0000 (0:00:00.036) 0:43:57.956 ****** 2025-10-02 12:50:14,187 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:14,200 p=33391 u=zuul n=ansible | TASK [artifacts : Verify if "success" flag exists after successful tests execution path={{ ansible_user_dir }}/cifmw-success] *** 2025-10-02 12:50:14,200 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:14 +0000 (0:00:00.038) 0:43:57.995 ****** 2025-10-02 12:50:14,472 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:14,484 p=33391 u=zuul n=ansible | TASK [artifacts : Ensure we have at least minimal ansible facts gather_subset=min] *** 2025-10-02 12:50:14,484 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:14 +0000 (0:00:00.284) 0:43:58.279 ****** 2025-10-02 12:50:15,209 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:15,221 p=33391 u=zuul n=ansible | TASK [artifacts : Ensure base directory exists path={{ cifmw_artifacts_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 12:50:15,221 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:15 +0000 (0:00:00.737) 0:43:59.016 ****** 2025-10-02 12:50:15,451 p=33391 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2025-10-02 12:50:15,659 p=33391 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-10-02 12:50:15,672 p=33391 u=zuul n=ansible | TASK [artifacts : Load generated hook environment for further usage dir={{ cifmw_artifacts_basedir }}/artifacts, depth=1, files_matching=^(pre|post).*\.yml$] *** 2025-10-02 12:50:15,672 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:15 +0000 (0:00:00.451) 0:43:59.467 ****** 2025-10-02 12:50:15,711 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:15,723 p=33391 u=zuul n=ansible | TASK [artifacts : Gather parameter passed to the playbook mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-vars.yml, content={{ vars | to_nice_yaml }}] *** 2025-10-02 12:50:15,724 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:15 +0000 (0:00:00.051) 0:43:59.518 ****** 2025-10-02 12:50:18,309 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:18,320 p=33391 u=zuul n=ansible | TASK [artifacts : Gather facts mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-facts.yml, content={{ ansible_facts | to_nice_yaml }}] *** 2025-10-02 12:50:18,320 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:18 +0000 (0:00:02.596) 0:44:02.115 ****** 2025-10-02 12:50:18,797 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:18,810 p=33391 u=zuul n=ansible | TASK [artifacts : Copy some network configuration files _raw_params=cp /etc/resolv.conf /etc/hosts {{ cifmw_artifacts_basedir }}/artifacts/ cp -r /etc/NetworkManager/system-connections {{ cifmw_artifacts_basedir }}/artifacts/NetworkManager cp -r /etc/yum.repos.d {{ cifmw_artifacts_basedir }}/artifacts/yum_repos test -d /etc/ci/env && cp -r /etc/ci/env {{ cifmw_artifacts_basedir }}/artifacts/ci-env test -d /var/log/bmaas_console_logs && cp -r /var/log/bmaas_console_logs {{ cifmw_artifacts_basedir }}/logs ip ro ls > {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip rule ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip -j -p link ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt] *** 2025-10-02 12:50:18,810 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:18 +0000 (0:00:00.489) 0:44:02.605 ****** 2025-10-02 12:50:19,076 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:19,089 p=33391 u=zuul n=ansible | TASK [artifacts : Get installed packages list ] ******************************** 2025-10-02 12:50:19,090 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:19 +0000 (0:00:00.279) 0:44:02.884 ****** 2025-10-02 12:50:20,116 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:50:20,155 p=33391 u=zuul n=ansible | TASK [artifacts : Output package list mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/installed-packages.yml, content={{ ansible_facts.packages | to_nice_yaml }}] *** 2025-10-02 12:50:20,155 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:20 +0000 (0:00:01.065) 0:44:03.950 ****** 2025-10-02 12:50:20,776 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:20,870 p=33391 u=zuul n=ansible | TASK [artifacts : Cleanup unnecesary directories path={{ item }}, state=absent] *** 2025-10-02 12:50:20,870 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:20 +0000 (0:00:00.715) 0:44:04.665 ****** 2025-10-02 12:50:21,162 p=33391 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/operator) 2025-10-02 12:50:21,206 p=33391 u=zuul n=ansible | TASK [os_must_gather : Ensure directories are present path={{ cifmw_os_must_gather_output_dir }}/logs/openstack-k8s-operators-openstack-must-gather, state=directory, mode=0755] *** 2025-10-02 12:50:21,206 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.335) 0:44:05.000 ****** 2025-10-02 12:50:21,438 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:21,470 p=33391 u=zuul n=ansible | TASK [os_must_gather : Construct project change list zuul_change_list={{ zuul_change_list | default([]) + [item.project.short_name] }}, cacheable=True] *** 2025-10-02 12:50:21,470 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.263) 0:44:05.264 ****** 2025-10-02 12:50:21,510 p=33391 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '282', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/282', 'commit_id': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'patchset': 'f4db4918d3d9d309fe468fe457835ad03c41d70c', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2025-10-02 12:50:21,553 p=33391 u=zuul n=ansible | TASK [os_must_gather : Get git tag for image tagging chdir={{ cifmw_os_must_gather_repo_path }}, _raw_params=git show-ref --head --hash head] *** 2025-10-02 12:50:21,553 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.083) 0:44:05.347 ****** 2025-10-02 12:50:21,577 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:21,610 p=33391 u=zuul n=ansible | TASK [os_must_gather : Debug git show-ref msg={{ openstack_must_gather_tag }}] *** 2025-10-02 12:50:21,610 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.057) 0:44:05.404 ****** 2025-10-02 12:50:21,634 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:21,665 p=33391 u=zuul n=ansible | TASK [os_must_gather : Build openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-build, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-10-02 12:50:21,665 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.055) 0:44:05.460 ****** 2025-10-02 12:50:21,690 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:21,728 p=33391 u=zuul n=ansible | TASK [os_must_gather : Push openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-push, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-10-02 12:50:21,728 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.062) 0:44:05.522 ****** 2025-10-02 12:50:21,752 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:21,784 p=33391 u=zuul n=ansible | TASK [os_must_gather : Set cifmw_os_must_gather_image to new image tag cifmw_os_must_gather_image={{ cifmw_os_must_gather_image_registry }}/openstack-must-gather:{{ openstack_must_gather_tag.stdout }}] *** 2025-10-02 12:50:21,784 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.056) 0:44:05.579 ****** 2025-10-02 12:50:21,810 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:50:21,838 p=33391 u=zuul n=ansible | TASK [os_must_gather : Check for oc command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=command -v oc] *** 2025-10-02 12:50:21,839 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.054) 0:44:05.633 ****** 2025-10-02 12:50:21,892 p=33391 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_016_check_for_oc.log 2025-10-02 12:50:21,965 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:50:21,996 p=33391 u=zuul n=ansible | TASK [os_must_gather : Run openstack-must-gather command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=oc adm must-gather --image {{ cifmw_os_must_gather_image }} --timeout {{ cifmw_os_must_gather_timeout }} --host-network={{ cifmw_os_must_gather_host_network }} --dest-dir {{ cifmw_os_must_gather_output_dir }}/logs/openstack-k8s-operators-openstack-must-gather -- ADDITIONAL_NAMESPACES={{ cifmw_os_must_gather_additional_namespaces }} OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1] *** 2025-10-02 12:50:21,996 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:50:21 +0000 (0:00:00.157) 0:44:05.791 ****** 2025-10-02 12:50:22,063 p=33391 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_017_run_openstack_must_gather.log 2025-10-02 12:57:46,243 p=33391 u=zuul n=ansible | changed: [localhost] 2025-10-02 12:57:46,407 p=33391 u=zuul n=ansible | TASK [artifacts : Create crc logs directory path={{ cifmw_artifacts_basedir }}/logs/crc, state=directory, mode=0755] *** 2025-10-02 12:57:46,407 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:46 +0000 (0:07:24.410) 0:51:30.202 ****** 2025-10-02 12:57:46,430 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:46,461 p=33391 u=zuul n=ansible | TASK [artifacts : Ensure controller knows CRC ssh keys _raw_params=ssh-keyscan {{ cifmw_artifacts_crc_host }} >> ~/.ssh/known_hosts] *** 2025-10-02 12:57:46,461 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:46 +0000 (0:00:00.053) 0:51:30.255 ****** 2025-10-02 12:57:46,479 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:46,511 p=33391 u=zuul n=ansible | TASK [artifacts : Recognize new keypair path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-10-02 12:57:46,511 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:46 +0000 (0:00:00.050) 0:51:30.305 ****** 2025-10-02 12:57:46,529 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:46,568 p=33391 u=zuul n=ansible | TASK [artifacts : Set fact if new keypair exists new_keypair_path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-10-02 12:57:46,569 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:46 +0000 (0:00:00.057) 0:51:30.363 ****** 2025-10-02 12:57:46,589 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:46,621 p=33391 u=zuul n=ansible | TASK [artifacts : Prepare root ssh accesses output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=ssh -i {{ new_keypair_path | default(cifmw_artifacts_crc_sshkey) }} {{ cifmw_artifacts_crc_user }}@{{ cifmw_artifacts_crc_host }} < /tmp/{{ host_ip }}/ovs_vsctl_list_openvswitch.txt sudo ip netns > /tmp/{{ host_ip }}/ip_netns.txt sudo ip a > /tmp/{{ host_ip }}/network.txt sudo ip ro ls >> /tmp/{{ host_ip }}/network.txt sudo rpm -qa > /tmp/{{ host_ip }}/rpm_qa.txt sudo dnf list installed > /tmp/{{ host_ip }}/dnf_list_installed.txt sudo podman images --digests > /tmp/{{ host_ip }}/podman_images.txt sudo fips-mode-setup --check > /tmp/{{ host_ip }}/fips_check.txt mkdir -p /tmp/{{ host_ip }}/service_logs systemctl list-units | awk '/virt|edpm|ovs/ {print $1}' | egrep -v "sys|ovs-delete-transient-ports" | xargs -I {} sudo bash -c 'journalctl -u {} > /tmp/{{ host_ip }}/service_logs/{}.log' sudo ausearch -i | grep denied > /tmp/{{ host_ip }}/selinux-denials.log || true sudo journalctl -p warning -t kernel -o short -g DROPPING --no-pager &> /tmp/{{ host_ip }}/firewall-drops.txt || true EOF] *** 2025-10-02 12:57:47,215 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:47 +0000 (0:00:00.101) 0:51:31.009 ****** 2025-10-02 12:57:47,258 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:47,295 p=33391 u=zuul n=ansible | TASK [artifacts : Copy logs to host machine from {{ item.split('/')[0] }} output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=rsync -a -e "ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i {{ ssh_key_file }}" {{ ssh_user }}@{{ host_ip }}:/tmp/{{ host_ip }} {{ cifmw_artifacts_basedir }}/logs/;] *** 2025-10-02 12:57:47,295 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:47 +0000 (0:00:00.080) 0:51:31.089 ****** 2025-10-02 12:57:47,340 p=33391 u=zuul n=ansible | skipping: [localhost] 2025-10-02 12:57:47,511 p=33391 u=zuul n=ansible | TASK [artifacts : Generate list of ansible logs to collect in home directory paths={{ ansible_user_dir }}, patterns=*ansible*.log] *** 2025-10-02 12:57:47,511 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:47 +0000 (0:00:00.216) 0:51:31.306 ****** 2025-10-02 12:57:47,843 p=33391 u=zuul n=ansible | ok: [localhost] 2025-10-02 12:57:47,875 p=33391 u=zuul n=ansible | TASK [artifacts : Copy ansible logs to logs directory src={{ item.path }}, dest={{ cifmw_artifacts_basedir }}/logs/, remote_src=True, mode=0644] *** 2025-10-02 12:57:47,875 p=33391 u=zuul n=ansible | Thursday 02 October 2025 12:57:47 +0000 (0:00:00.364) 0:51:31.670 ******