2025-10-02 16:26:03,339 p=27796 u=zuul n=ansible | Starting galaxy collection install process 2025-10-02 16:26:03,340 p=27796 u=zuul n=ansible | Process install dependency map 2025-10-02 16:26:17,319 p=27796 u=zuul n=ansible | Starting collection install process 2025-10-02 16:26:17,319 p=27796 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+61c908bc' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-10-02 16:26:17,811 p=27796 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+61c908bc at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-10-02 16:26:17,811 p=27796 u=zuul n=ansible | cifmw.general:1.0.0+61c908bc was installed successfully 2025-10-02 16:26:17,812 p=27796 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-10-02 16:26:17,871 p=27796 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-10-02 16:26:17,871 p=27796 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-10-02 16:26:17,871 p=27796 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-10-02 16:26:18,612 p=27796 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-10-02 16:26:18,612 p=27796 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-10-02 16:26:18,612 p=27796 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-10-02 16:26:18,662 p=27796 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-10-02 16:26:18,662 p=27796 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-10-02 16:26:18,662 p=27796 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-10-02 16:26:18,759 p=27796 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-10-02 16:26:18,759 p=27796 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-10-02 16:26:18,759 p=27796 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-10-02 16:26:18,781 p=27796 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-10-02 16:26:18,781 p=27796 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-10-02 16:26:18,782 p=27796 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-10-02 16:26:18,922 p=27796 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-10-02 16:26:18,922 p=27796 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-10-02 16:26:18,922 p=27796 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-10-02 16:26:19,038 p=27796 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-10-02 16:26:19,038 p=27796 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-10-02 16:26:19,038 p=27796 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-10-02 16:26:19,108 p=27796 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-10-02 16:26:19,109 p=27796 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-10-02 16:26:19,109 p=27796 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-10-02 16:26:19,127 p=27796 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-10-02 16:26:19,127 p=27796 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-10-02 16:26:19,127 p=27796 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-10-02 16:26:19,363 p=27796 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-10-02 16:26:19,363 p=27796 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-10-02 16:26:19,364 p=27796 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-10-02 16:26:19,625 p=27796 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-10-02 16:26:19,625 p=27796 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-10-02 16:26:19,625 p=27796 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-10-02 16:26:19,658 p=27796 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-10-02 16:26:19,658 p=27796 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-10-02 16:26:19,658 p=27796 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-10-02 16:26:19,688 p=27796 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-10-02 16:26:19,688 p=27796 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-10-02 16:26:19,688 p=27796 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-10-02 16:26:19,779 p=27796 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-10-02 16:26:19,779 p=27796 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-10-02 16:26:29,945 p=28431 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-10-02 16:26:29,964 p=28431 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-10-02 16:26:29,965 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:29 +0000 (0:00:00.036) 0:00:00.036 ****** 2025-10-02 16:26:30,976 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:31,023 p=28431 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-10-02 16:26:31,023 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:01.058) 0:00:01.094 ****** 2025-10-02 16:26:31,354 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:31,360 p=28431 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-10-02 16:26:31,360 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:00.336) 0:00:01.431 ****** 2025-10-02 16:26:31,378 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-10-02 16:26:31,436 p=28431 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-10-02 16:26:31,436 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:00.076) 0:00:01.508 ****** 2025-10-02 16:26:31,462 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:31,470 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 16:26:31,470 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:00.033) 0:00:01.541 ****** 2025-10-02 16:26:31,501 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:31,509 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-10-02 16:26:31,509 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:00.039) 0:00:01.580 ****** 2025-10-02 16:26:31,569 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:31,576 p=28431 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-10-02 16:26:31,577 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:31 +0000 (0:00:00.067) 0:00:01.648 ****** 2025-10-02 16:26:32,053 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:32,060 p=28431 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-10-02 16:26:32,060 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:32 +0000 (0:00:00.483) 0:00:02.131 ****** 2025-10-02 16:26:32,078 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:32,086 p=28431 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-10-02 16:26:32,086 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:32 +0000 (0:00:00.025) 0:00:02.157 ****** 2025-10-02 16:26:32,106 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:32,113 p=28431 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-10-02 16:26:32,113 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:32 +0000 (0:00:00.026) 0:00:02.184 ****** 2025-10-02 16:26:32,134 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:32,141 p=28431 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-10-02 16:26:32,141 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:32 +0000 (0:00:00.028) 0:00:02.212 ****** 2025-10-02 16:26:33,553 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:33,564 p=28431 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 16:26:33,564 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:33 +0000 (0:00:01.423) 0:00:03.635 ****** 2025-10-02 16:26:33,767 p=28431 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-10-02 16:26:33,935 p=28431 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-10-02 16:26:34,113 p=28431 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-10-02 16:26:34,121 p=28431 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-10-02 16:26:34,122 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:34 +0000 (0:00:00.557) 0:00:04.193 ****** 2025-10-02 16:26:35,129 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:35,135 p=28431 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-10-02 16:26:35,136 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:35 +0000 (0:00:01.013) 0:00:05.207 ****** 2025-10-02 16:26:36,389 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:36,403 p=28431 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-10-02 16:26:36,403 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:36 +0000 (0:00:01.267) 0:00:06.474 ****** 2025-10-02 16:26:45,068 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:45,074 p=28431 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-10-02 16:26:45,074 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:45 +0000 (0:00:08.671) 0:00:15.145 ****** 2025-10-02 16:26:45,892 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:45,899 p=28431 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-10-02 16:26:45,899 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:45 +0000 (0:00:00.824) 0:00:15.970 ****** 2025-10-02 16:26:45,926 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:45,933 p=28431 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-10-02 16:26:45,933 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:45 +0000 (0:00:00.033) 0:00:16.004 ****** 2025-10-02 16:26:46,594 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:46,602 p=28431 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-10-02 16:26:46,602 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:46 +0000 (0:00:00.669) 0:00:16.673 ****** 2025-10-02 16:26:46,641 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:46,647 p=28431 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-10-02 16:26:46,647 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:46 +0000 (0:00:00.045) 0:00:16.719 ****** 2025-10-02 16:26:46,682 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:46,688 p=28431 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-10-02 16:26:46,689 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:46 +0000 (0:00:00.041) 0:00:16.760 ****** 2025-10-02 16:26:46,719 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:46,727 p=28431 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-10-02 16:26:46,727 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:46 +0000 (0:00:00.038) 0:00:16.798 ****** 2025-10-02 16:26:47,172 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:47,180 p=28431 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 16:26:47,180 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.453) 0:00:17.251 ****** 2025-10-02 16:26:47,881 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:47,887 p=28431 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 16:26:47,888 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.707) 0:00:17.959 ****** 2025-10-02 16:26:47,904 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:47,910 p=28431 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-10-02 16:26:47,910 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.022) 0:00:17.982 ****** 2025-10-02 16:26:47,927 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:47,934 p=28431 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-10-02 16:26:47,934 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.023) 0:00:18.005 ****** 2025-10-02 16:26:47,949 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:47,956 p=28431 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-10-02 16:26:47,956 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.022) 0:00:18.027 ****** 2025-10-02 16:26:47,982 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:47,988 p=28431 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-10-02 16:26:47,988 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:47 +0000 (0:00:00.032) 0:00:18.059 ****** 2025-10-02 16:26:48,002 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,009 p=28431 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-10-02 16:26:48,009 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.020) 0:00:18.080 ****** 2025-10-02 16:26:48,022 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,029 p=28431 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-10-02 16:26:48,029 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.020) 0:00:18.100 ****** 2025-10-02 16:26:48,047 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,055 p=28431 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-10-02 16:26:48,055 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.026) 0:00:18.126 ****** 2025-10-02 16:26:48,069 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,075 p=28431 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-10-02 16:26:48,075 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.019) 0:00:18.146 ****** 2025-10-02 16:26:48,089 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,096 p=28431 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-10-02 16:26:48,096 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.020) 0:00:18.167 ****** 2025-10-02 16:26:48,110 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,118 p=28431 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-10-02 16:26:48,118 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.022) 0:00:18.189 ****** 2025-10-02 16:26:48,132 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:48,141 p=28431 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-10-02 16:26:48,141 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.023) 0:00:18.212 ****** 2025-10-02 16:26:48,332 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:48,340 p=28431 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-10-02 16:26:48,340 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.198) 0:00:18.411 ****** 2025-10-02 16:26:48,535 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:48,542 p=28431 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-10-02 16:26:48,542 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.202) 0:00:18.614 ****** 2025-10-02 16:26:48,745 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:48,752 p=28431 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-10-02 16:26:48,753 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:48 +0000 (0:00:00.210) 0:00:18.824 ****** 2025-10-02 16:26:49,311 p=28431 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.74:8766/gating.repo 2025-10-02 16:26:49,311 p=28431 u=zuul n=ansible | ...ignoring 2025-10-02 16:26:49,326 p=28431 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-10-02 16:26:49,327 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.573) 0:00:19.398 ****** 2025-10-02 16:26:49,360 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:49,373 p=28431 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-10-02 16:26:49,374 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.047) 0:00:19.445 ****** 2025-10-02 16:26:49,403 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:49,413 p=28431 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-10-02 16:26:49,413 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.039) 0:00:19.484 ****** 2025-10-02 16:26:49,441 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:49,450 p=28431 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-10-02 16:26:49,450 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.037) 0:00:19.521 ****** 2025-10-02 16:26:49,479 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:49,486 p=28431 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-10-02 16:26:49,486 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.035) 0:00:19.557 ****** 2025-10-02 16:26:49,514 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:26:49,523 p=28431 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-10-02 16:26:49,523 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.037) 0:00:19.594 ****** 2025-10-02 16:26:49,817 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:26:49,824 p=28431 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-10-02 16:26:49,824 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:49 +0000 (0:00:00.300) 0:00:19.895 ****** 2025-10-02 16:26:50,049 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-10-02 16:26:50,245 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-10-02 16:26:50,253 p=28431 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-10-02 16:26:50,254 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:50 +0000 (0:00:00.429) 0:00:20.325 ****** 2025-10-02 16:26:50,726 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:50,732 p=28431 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-10-02 16:26:50,733 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:50 +0000 (0:00:00.478) 0:00:20.804 ****** 2025-10-02 16:26:50,988 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:26:51,004 p=28431 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-10-02 16:26:51,004 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:51 +0000 (0:00:00.271) 0:00:21.076 ****** 2025-10-02 16:26:51,037 p=28431 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-10-02 16:26:51,046 p=28431 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-10-02 16:26:51,046 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:51 +0000 (0:00:00.041) 0:00:21.118 ****** 2025-10-02 16:26:51,063 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-10-02 16:26:51,070 p=28431 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-10-02 16:26:51,070 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:26:51 +0000 (0:00:00.023) 0:00:21.141 ****** 2025-10-02 16:27:18,390 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:18,398 p=28431 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-10-02 16:27:18,398 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:18 +0000 (0:00:27.327) 0:00:48.469 ****** 2025-10-02 16:27:18,594 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:18,601 p=28431 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-10-02 16:27:18,602 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:18 +0000 (0:00:00.203) 0:00:48.673 ****** 2025-10-02 16:27:18,779 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:18,786 p=28431 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-10-02 16:27:18,786 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:18 +0000 (0:00:00.184) 0:00:48.858 ****** 2025-10-02 16:27:23,896 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:23,903 p=28431 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 16:27:23,903 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:23 +0000 (0:00:05.116) 0:00:53.974 ****** 2025-10-02 16:27:23,932 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:23,939 p=28431 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-10-02 16:27:23,939 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:23 +0000 (0:00:00.035) 0:00:54.010 ****** 2025-10-02 16:27:24,231 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:24,239 p=28431 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-10-02 16:27:24,240 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.300) 0:00:54.311 ****** 2025-10-02 16:27:24,532 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:24,539 p=28431 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-10-02 16:27:24,539 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.299) 0:00:54.610 ****** 2025-10-02 16:27:24,555 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,561 p=28431 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-10-02 16:27:24,561 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.021) 0:00:54.632 ****** 2025-10-02 16:27:24,574 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,580 p=28431 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-10-02 16:27:24,581 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.019) 0:00:54.652 ****** 2025-10-02 16:27:24,595 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,602 p=28431 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-10-02 16:27:24,602 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.021) 0:00:54.673 ****** 2025-10-02 16:27:24,614 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,621 p=28431 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-10-02 16:27:24,621 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.019) 0:00:54.692 ****** 2025-10-02 16:27:24,633 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,640 p=28431 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-10-02 16:27:24,640 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.018) 0:00:54.711 ****** 2025-10-02 16:27:24,662 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:24,667 p=28431 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-10-02 16:27:24,667 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:24 +0000 (0:00:00.027) 0:00:54.738 ****** 2025-10-02 16:27:24,888 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-10-02 16:27:25,074 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-10-02 16:27:25,266 p=28431 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-10-02 16:27:25,465 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-10-02 16:27:25,640 p=28431 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 16:27:25,652 p=28431 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-10-02 16:27:25,652 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:25 +0000 (0:00:00.984) 0:00:55.723 ****** 2025-10-02 16:27:25,785 p=28431 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-10-02 16:27:25,785 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:25 +0000 (0:00:00.132) 0:00:55.856 ****** 2025-10-02 16:27:25,982 p=28431 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-10-02 16:27:26,153 p=28431 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-10-02 16:27:26,328 p=28431 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 16:27:26,336 p=28431 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-10-02 16:27:26,336 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.551) 0:00:56.407 ****** 2025-10-02 16:27:26,369 p=28431 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-10-02 16:27:26,370 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.033) 0:00:56.441 ****** 2025-10-02 16:27:26,412 p=28431 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) 2025-10-02 16:27:26,420 p=28431 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-10-02 16:27:26,420 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.050) 0:00:56.491 ****** 2025-10-02 16:27:26,463 p=28431 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) => msg: | _repo_operator_name: nova _repo_operator_info: [{'key': 'NOVA_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator'}, {'key': 'NOVA_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'NOVA_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator', 'NOVA_BRANCH': ''} 2025-10-02 16:27:26,476 p=28431 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-10-02 16:27:26,476 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.055) 0:00:56.547 ****** 2025-10-02 16:27:26,535 p=28431 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2025-10-02 16:27:26,543 p=28431 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-10-02 16:27:26,543 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.067) 0:00:56.615 ****** 2025-10-02 16:27:26,580 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:26,586 p=28431 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-10-02 16:27:26,586 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:26 +0000 (0:00:00.043) 0:00:56.658 ****** 2025-10-02 16:27:27,174 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:27,181 p=28431 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-10-02 16:27:27,181 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.594) 0:00:57.253 ****** 2025-10-02 16:27:27,379 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:27,387 p=28431 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-10-02 16:27:27,387 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.205) 0:00:57.458 ****** 2025-10-02 16:27:27,427 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:27,440 p=28431 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-10-02 16:27:27,440 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.053) 0:00:57.511 ****** 2025-10-02 16:27:27,819 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:27,826 p=28431 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-10-02 16:27:27,826 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.385) 0:00:57.897 ****** 2025-10-02 16:27:27,847 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:27,854 p=28431 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-10-02 16:27:27,854 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.028) 0:00:57.925 ****** 2025-10-02 16:27:27,868 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2025-10-02 16:27:27,875 p=28431 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-10-02 16:27:27,876 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.021) 0:00:57.947 ****** 2025-10-02 16:27:27,900 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '1234567842' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: '' NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12345678' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: osp-secret SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: tests/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_USER:' 2025-10-02 16:27:27,907 p=28431 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-10-02 16:27:27,907 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:27 +0000 (0:00:00.031) 0:00:57.978 ****** 2025-10-02 16:27:28,217 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:28,228 p=28431 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-10-02 16:27:28,228 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:28 +0000 (0:00:00.321) 0:00:58.300 ****** 2025-10-02 16:27:28,251 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-10-02 16:27:28,261 p=28431 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:27:28,262 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:28 +0000 (0:00:00.033) 0:00:58.333 ****** 2025-10-02 16:27:28,672 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:28,683 p=28431 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-10-02 16:27:28,683 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:28 +0000 (0:00:00.421) 0:00:58.755 ****** 2025-10-02 16:27:28,702 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:28,724 p=28431 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-10-02 16:27:28,724 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:28 +0000 (0:00:00.040) 0:00:58.795 ****** 2025-10-02 16:27:29,109 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:29,128 p=28431 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-10-02 16:27:29,129 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:29 +0000 (0:00:00.404) 0:00:59.200 ****** 2025-10-02 16:27:29,158 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:29,176 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-10-02 16:27:29,176 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:29 +0000 (0:00:00.047) 0:00:59.247 ****** 2025-10-02 16:27:29,663 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:27:29,683 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:27:29,684 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:29 +0000 (0:00:00.507) 0:00:59.755 ****** 2025-10-02 16:27:29,759 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:29,768 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:27:29,768 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:29 +0000 (0:00:00.084) 0:00:59.839 ****** 2025-10-02 16:27:29,888 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:29,909 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:27:29,909 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:29 +0000 (0:00:00.140) 0:00:59.980 ****** 2025-10-02 16:27:30,054 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-10-02 16:27:30,066 p=28431 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:27:30,066 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.157) 0:01:00.138 ****** 2025-10-02 16:27:30,115 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:30,123 p=28431 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:27:30,123 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.056) 0:01:00.194 ****** 2025-10-02 16:27:30,343 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:30,350 p=28431 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:27:30,350 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.227) 0:01:00.422 ****** 2025-10-02 16:27:30,365 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:27:30,373 p=28431 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:27:30,373 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.022) 0:01:00.444 ****** 2025-10-02 16:27:30,720 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:30,730 p=28431 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:27:30,730 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.357) 0:01:00.801 ****** 2025-10-02 16:27:30,747 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:30,754 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:27:30,754 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.023) 0:01:00.825 ****** 2025-10-02 16:27:30,987 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:30,996 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:27:30,996 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:30 +0000 (0:00:00.241) 0:01:01.067 ****** 2025-10-02 16:27:31,213 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:27:31,224 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-10-02 16:27:31,224 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:27:31 +0000 (0:00:00.228) 0:01:01.295 ****** 2025-10-02 16:27:31,270 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2025-10-02 16:28:15,413 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:15,424 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-10-02 16:28:15,424 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:44.199) 0:01:45.495 ****** 2025-10-02 16:28:15,442 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:15,452 p=28431 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:28:15,452 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.028) 0:01:45.523 ****** 2025-10-02 16:28:15,622 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:15,632 p=28431 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:28:15,632 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.179) 0:01:45.703 ****** 2025-10-02 16:28:15,646 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:15,692 p=28431 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-10-02 16:28:15,713 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:28:15,713 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.080) 0:01:45.784 ****** 2025-10-02 16:28:15,758 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:15,765 p=28431 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-10-02 16:28:15,765 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.052) 0:01:45.836 ****** 2025-10-02 16:28:15,787 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:15,795 p=28431 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-10-02 16:28:15,795 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.029) 0:01:45.866 ****** 2025-10-02 16:28:15,813 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:15,846 p=28431 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-10-02 16:28:15,882 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:28:15,882 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.087) 0:01:45.953 ****** 2025-10-02 16:28:15,967 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:15,975 p=28431 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 16:28:15,975 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:15 +0000 (0:00:00.092) 0:01:46.046 ****** 2025-10-02 16:28:16,141 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:16,149 p=28431 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-10-02 16:28:16,149 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.174) 0:01:46.221 ****** 2025-10-02 16:28:16,169 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,178 p=28431 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 16:28:16,178 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.028) 0:01:46.249 ****** 2025-10-02 16:28:16,197 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,205 p=28431 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-10-02 16:28:16,206 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.027) 0:01:46.277 ****** 2025-10-02 16:28:16,226 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,241 p=28431 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-10-02 16:28:16,241 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.035) 0:01:46.312 ****** 2025-10-02 16:28:16,268 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,277 p=28431 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-10-02 16:28:16,277 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.035) 0:01:46.348 ****** 2025-10-02 16:28:16,304 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,313 p=28431 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-10-02 16:28:16,313 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.036) 0:01:46.384 ****** 2025-10-02 16:28:16,336 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,344 p=28431 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:28:16,344 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.031) 0:01:46.416 ****** 2025-10-02 16:28:16,526 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:16,535 p=28431 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-10-02 16:28:16,535 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.190) 0:01:46.606 ****** 2025-10-02 16:28:16,601 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-10-02 16:28:16,612 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:16,612 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.077) 0:01:46.684 ****** 2025-10-02 16:28:16,633 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,642 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:16,642 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.029) 0:01:46.713 ****** 2025-10-02 16:28:16,663 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,672 p=28431 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-10-02 16:28:16,672 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.029) 0:01:46.743 ****** 2025-10-02 16:28:16,694 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:16,702 p=28431 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-10-02 16:28:16,702 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.030) 0:01:46.773 ****** 2025-10-02 16:28:16,735 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:16,746 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:16,746 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.044) 0:01:46.818 ****** 2025-10-02 16:28:16,921 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:16,940 p=28431 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-10-02 16:28:16,940 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.193) 0:01:47.011 ****** 2025-10-02 16:28:16,968 p=28431 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:28:16,977 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:16,977 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:16 +0000 (0:00:00.036) 0:01:47.048 ****** 2025-10-02 16:28:16,999 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:17,010 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-10-02 16:28:17,010 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.033) 0:01:47.081 ****** 2025-10-02 16:28:17,030 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:17,038 p=28431 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-10-02 16:28:17,038 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.027) 0:01:47.109 ****** 2025-10-02 16:28:17,056 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:17,064 p=28431 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-10-02 16:28:17,064 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.025) 0:01:47.135 ****** 2025-10-02 16:28:17,085 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:17,093 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-10-02 16:28:17,094 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.029) 0:01:47.165 ****** 2025-10-02 16:28:17,116 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-10-02 16:28:17,130 p=28431 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:28:17,130 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.036) 0:01:47.202 ****** 2025-10-02 16:28:17,146 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:17,156 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-10-02 16:28:17,157 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.026) 0:01:47.228 ****** 2025-10-02 16:28:17,205 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-10-02 16:28:17,473 p=28431 u=zuul n=ansible | An exception occurred during task execution. To see the full traceback, use -vvv. The error was: NoneType: None 2025-10-02 16:28:17,473 p=28431 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: true msg: non-zero return code rc: 1 stderr: '' stderr_lines: [] stdout: | WARNING: Using insecure TLS client config. Setting this option is not supported! Error from server (InternalError): Internal error occurred: unexpected response: 400 stdout_lines: - 'WARNING: Using insecure TLS client config. Setting this option is not supported!' - '' - 'Error from server (InternalError): Internal error occurred: unexpected response: 400' 2025-10-02 16:28:17,487 p=28431 u=zuul n=ansible | TASK [openshift_login : Fail if no token msg=Token fetch failed after retries] *** 2025-10-02 16:28:17,487 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.330) 0:01:47.558 ****** 2025-10-02 16:28:17,503 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:17,512 p=28431 u=zuul n=ansible | TASK [openshift_login : Wait before reattempt seconds={{ cifmw_openshift_login_retries_delay }}] *** 2025-10-02 16:28:17,512 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:17 +0000 (0:00:00.024) 0:01:47.583 ****** 2025-10-02 16:28:17,528 p=28431 u=zuul n=ansible | Pausing for 10 seconds 2025-10-02 16:28:27,532 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:27,540 p=28431 u=zuul n=ansible | TASK [openshift_login : Run login _raw_params=login.yml] *********************** 2025-10-02 16:28:27,540 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:10.027) 0:01:57.611 ****** 2025-10-02 16:28:27,569 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-10-02 16:28:27,585 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:27,585 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.044) 0:01:57.656 ****** 2025-10-02 16:28:27,604 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:27,615 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:27,615 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.030) 0:01:57.687 ****** 2025-10-02 16:28:27,634 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:27,645 p=28431 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-10-02 16:28:27,645 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.029) 0:01:57.716 ****** 2025-10-02 16:28:27,661 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:27,670 p=28431 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-10-02 16:28:27,670 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.025) 0:01:57.741 ****** 2025-10-02 16:28:27,701 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:27,708 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:27,709 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.038) 0:01:57.780 ****** 2025-10-02 16:28:27,867 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:27,876 p=28431 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-10-02 16:28:27,876 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.167) 0:01:57.947 ****** 2025-10-02 16:28:27,906 p=28431 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:28:27,913 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:27,913 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.037) 0:01:57.985 ****** 2025-10-02 16:28:27,935 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:27,943 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-10-02 16:28:27,943 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.029) 0:01:58.015 ****** 2025-10-02 16:28:27,962 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:27,971 p=28431 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-10-02 16:28:27,971 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:27 +0000 (0:00:00.027) 0:01:58.042 ****** 2025-10-02 16:28:27,994 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:28,003 p=28431 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-10-02 16:28:28,003 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.032) 0:01:58.074 ****** 2025-10-02 16:28:28,031 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:28,040 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-10-02 16:28:28,040 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.036) 0:01:58.111 ****** 2025-10-02 16:28:28,064 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-10-02 16:28:28,076 p=28431 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:28:28,076 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.036) 0:01:58.147 ****** 2025-10-02 16:28:28,094 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:28,102 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-10-02 16:28:28,102 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.026) 0:01:58.173 ****** 2025-10-02 16:28:28,155 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_fetch_openshift.log 2025-10-02 16:28:28,413 p=28431 u=zuul n=ansible | An exception occurred during task execution. To see the full traceback, use -vvv. The error was: NoneType: None 2025-10-02 16:28:28,414 p=28431 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: true msg: non-zero return code rc: 1 stderr: '' stderr_lines: [] stdout: | WARNING: Using insecure TLS client config. Setting this option is not supported! Error from server (InternalError): Internal error occurred: unexpected response: 400 stdout_lines: - 'WARNING: Using insecure TLS client config. Setting this option is not supported!' - '' - 'Error from server (InternalError): Internal error occurred: unexpected response: 400' 2025-10-02 16:28:28,421 p=28431 u=zuul n=ansible | TASK [openshift_login : Fail if no token msg=Token fetch failed after retries] *** 2025-10-02 16:28:28,421 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.318) 0:01:58.492 ****** 2025-10-02 16:28:28,437 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:28,444 p=28431 u=zuul n=ansible | TASK [openshift_login : Wait before reattempt seconds={{ cifmw_openshift_login_retries_delay }}] *** 2025-10-02 16:28:28,445 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:28 +0000 (0:00:00.023) 0:01:58.516 ****** 2025-10-02 16:28:28,458 p=28431 u=zuul n=ansible | Pausing for 10 seconds 2025-10-02 16:28:38,472 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:38,480 p=28431 u=zuul n=ansible | TASK [openshift_login : Run login _raw_params=login.yml] *********************** 2025-10-02 16:28:38,480 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:10.035) 0:02:08.551 ****** 2025-10-02 16:28:38,506 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-10-02 16:28:38,525 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:38,525 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.044) 0:02:08.596 ****** 2025-10-02 16:28:38,544 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,555 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:28:38,555 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.030) 0:02:08.626 ****** 2025-10-02 16:28:38,575 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,582 p=28431 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-10-02 16:28:38,582 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.027) 0:02:08.654 ****** 2025-10-02 16:28:38,599 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,609 p=28431 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-10-02 16:28:38,609 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.026) 0:02:08.680 ****** 2025-10-02 16:28:38,640 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:38,648 p=28431 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:38,648 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.038) 0:02:08.719 ****** 2025-10-02 16:28:38,811 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:38,819 p=28431 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-10-02 16:28:38,819 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.170) 0:02:08.890 ****** 2025-10-02 16:28:38,843 p=28431 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:28:38,851 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:28:38,851 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.031) 0:02:08.922 ****** 2025-10-02 16:28:38,871 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,880 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-10-02 16:28:38,880 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.029) 0:02:08.951 ****** 2025-10-02 16:28:38,899 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,909 p=28431 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-10-02 16:28:38,910 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.029) 0:02:08.981 ****** 2025-10-02 16:28:38,928 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:38,937 p=28431 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-10-02 16:28:38,937 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.027) 0:02:09.009 ****** 2025-10-02 16:28:38,961 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:38,970 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-10-02 16:28:38,971 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:38 +0000 (0:00:00.033) 0:02:09.042 ****** 2025-10-02 16:28:38,993 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-10-02 16:28:39,007 p=28431 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:28:39,007 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.036) 0:02:09.079 ****** 2025-10-02 16:28:39,024 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:39,034 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-10-02 16:28:39,034 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.026) 0:02:09.105 ****** 2025-10-02 16:28:39,086 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_fetch_openshift.log 2025-10-02 16:28:39,567 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:39,575 p=28431 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-10-02 16:28:39,575 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.540) 0:02:09.646 ****** 2025-10-02 16:28:39,592 p=28431 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:28:39,601 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:28:39,601 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.025) 0:02:09.672 ****** 2025-10-02 16:28:39,920 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:39,929 p=28431 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-10-02 16:28:39,929 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.328) 0:02:10.000 ****** 2025-10-02 16:28:39,960 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:39,974 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-10-02 16:28:39,974 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:39 +0000 (0:00:00.044) 0:02:10.045 ****** 2025-10-02 16:28:40,291 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:40,300 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-10-02 16:28:40,300 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:40 +0000 (0:00:00.325) 0:02:10.371 ****** 2025-10-02 16:28:40,581 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:40,589 p=28431 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-10-02 16:28:40,590 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:40 +0000 (0:00:00.289) 0:02:10.661 ****** 2025-10-02 16:28:40,918 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:40,927 p=28431 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-10-02 16:28:40,927 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:40 +0000 (0:00:00.337) 0:02:10.998 ****** 2025-10-02 16:28:40,960 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:40,971 p=28431 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-10-02 16:28:40,971 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:40 +0000 (0:00:00.043) 0:02:11.042 ****** 2025-10-02 16:28:41,373 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:41,381 p=28431 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-10-02 16:28:41,381 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:41 +0000 (0:00:00.410) 0:02:11.452 ****** 2025-10-02 16:28:41,688 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:41,700 p=28431 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-10-02 16:28:41,700 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:41 +0000 (0:00:00.319) 0:02:11.772 ****** 2025-10-02 16:28:42,126 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:42,140 p=28431 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:28:42,140 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:42 +0000 (0:00:00.439) 0:02:12.211 ****** 2025-10-02 16:28:42,325 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:42,334 p=28431 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-10-02 16:28:42,334 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:42 +0000 (0:00:00.193) 0:02:12.405 ****** 2025-10-02 16:28:42,360 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:42,377 p=28431 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-10-02 16:28:42,377 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:42 +0000 (0:00:00.043) 0:02:12.448 ****** 2025-10-02 16:28:43,323 p=28431 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-10-02 16:28:44,019 p=28431 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-10-02 16:28:44,042 p=28431 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-10-02 16:28:44,043 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:01.665) 0:02:14.114 ****** 2025-10-02 16:28:44,060 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,072 p=28431 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-10-02 16:28:44,072 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.029) 0:02:14.143 ****** 2025-10-02 16:28:44,097 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-10-02 16:28:44,098 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-10-02 16:28:44,099 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,108 p=28431 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-10-02 16:28:44,108 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.036) 0:02:14.179 ****** 2025-10-02 16:28:44,135 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,145 p=28431 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-10-02 16:28:44,145 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.037) 0:02:14.216 ****** 2025-10-02 16:28:44,168 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,180 p=28431 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-10-02 16:28:44,180 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.034) 0:02:14.251 ****** 2025-10-02 16:28:44,199 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,208 p=28431 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-10-02 16:28:44,208 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.027) 0:02:14.279 ****** 2025-10-02 16:28:44,231 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,242 p=28431 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-10-02 16:28:44,242 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.034) 0:02:14.313 ****** 2025-10-02 16:28:44,260 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,271 p=28431 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-10-02 16:28:44,271 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.029) 0:02:14.342 ****** 2025-10-02 16:28:44,289 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,297 p=28431 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-10-02 16:28:44,297 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.026) 0:02:14.369 ****** 2025-10-02 16:28:44,315 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,323 p=28431 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-10-02 16:28:44,323 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.025) 0:02:14.394 ****** 2025-10-02 16:28:44,343 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,353 p=28431 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-10-02 16:28:44,353 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.030) 0:02:14.424 ****** 2025-10-02 16:28:44,373 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,383 p=28431 u=zuul n=ansible | TASK [openshift_setup : Metal3 tweaks _raw_params=metal3_config.yml] *********** 2025-10-02 16:28:44,383 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.029) 0:02:14.454 ****** 2025-10-02 16:28:44,404 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_setup/tasks/metal3_config.yml for localhost 2025-10-02 16:28:44,417 p=28431 u=zuul n=ansible | TASK [openshift_setup : Fetch Metal3 configuration name _raw_params=oc get Provisioning -o name] *** 2025-10-02 16:28:44,417 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.034) 0:02:14.489 ****** 2025-10-02 16:28:44,430 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,438 p=28431 u=zuul n=ansible | TASK [openshift_setup : Apply the patch to Metal3 Provisioning _raw_params=oc patch {{ _cifmw_openshift_setup_provisioning_name.stdout }} --type='json' -p='[{"op": "replace", "path": "/spec/watchAllNamespaces", "value": true}]'] *** 2025-10-02 16:28:44,438 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.020) 0:02:14.509 ****** 2025-10-02 16:28:44,450 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:44,458 p=28431 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-10-02 16:28:44,458 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:44 +0000 (0:00:00.020) 0:02:14.530 ****** 2025-10-02 16:28:45,361 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:45,372 p=28431 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-10-02 16:28:45,373 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:45 +0000 (0:00:00.914) 0:02:15.444 ****** 2025-10-02 16:28:46,260 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:46,269 p=28431 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-10-02 16:28:46,270 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:46 +0000 (0:00:00.896) 0:02:16.341 ****** 2025-10-02 16:28:47,006 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:47,024 p=28431 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-10-02 16:28:47,024 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.754) 0:02:17.095 ****** 2025-10-02 16:28:47,043 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:47,054 p=28431 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-10-02 16:28:47,054 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.030) 0:02:17.126 ****** 2025-10-02 16:28:47,071 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:47,091 p=28431 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-10-02 16:28:47,091 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.036) 0:02:17.162 ****** 2025-10-02 16:28:47,112 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:47,126 p=28431 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-10-02 16:28:47,126 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.034) 0:02:17.197 ****** 2025-10-02 16:28:47,145 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:47,154 p=28431 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-10-02 16:28:47,154 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.028) 0:02:17.225 ****** 2025-10-02 16:28:47,278 p=28431 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 16:28:47,278 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.124) 0:02:17.350 ****** 2025-10-02 16:28:47,462 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:47,473 p=28431 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-10-02 16:28:47,474 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:47 +0000 (0:00:00.195) 0:02:17.545 ****** 2025-10-02 16:28:48,221 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:48,229 p=28431 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-10-02 16:28:48,229 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:48 +0000 (0:00:00.755) 0:02:18.300 ****** 2025-10-02 16:28:48,257 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-10-02 16:28:48,268 p=28431 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-10-02 16:28:48,268 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:48 +0000 (0:00:00.039) 0:02:18.339 ****** 2025-10-02 16:28:48,923 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:48,931 p=28431 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-10-02 16:28:48,931 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:48 +0000 (0:00:00.663) 0:02:19.003 ****** 2025-10-02 16:28:51,191 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:28:51,214 p=28431 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-10-02 16:28:51,214 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:51 +0000 (0:00:02.282) 0:02:21.285 ****** 2025-10-02 16:28:51,228 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:28:51,239 p=28431 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-10-02 16:28:51,239 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:51 +0000 (0:00:00.025) 0:02:21.310 ****** 2025-10-02 16:28:51,933 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:28:51,952 p=28431 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-10-02 16:28:51,952 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:28:51 +0000 (0:00:00.713) 0:02:22.023 ****** 2025-10-02 16:30:02,810 p=28431 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-10-02 16:30:13,528 p=28431 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-10-02 16:30:14,258 p=28431 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-10-02 16:30:14,273 p=28431 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2025-10-02 16:30:14,273 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:14 +0000 (0:01:22.320) 0:03:44.344 ****** 2025-10-02 16:30:14,473 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:14,483 p=28431 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ lookup('env', 'HOME') }}/bin/cmctl, mode=0755] *** 2025-10-02 16:30:14,483 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:14 +0000 (0:00:00.210) 0:03:44.554 ****** 2025-10-02 16:30:15,727 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:15,737 p=28431 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ lookup('env', 'HOME') }}/bin/cmctl check api --wait=2m] *** 2025-10-02 16:30:15,737 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:15 +0000 (0:00:01.253) 0:03:45.808 ****** 2025-10-02 16:30:16,104 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:16,130 p=28431 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-10-02 16:30:16,131 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.393) 0:03:46.202 ****** 2025-10-02 16:30:16,172 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,184 p=28431 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-10-02 16:30:16,185 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.053) 0:03:46.256 ****** 2025-10-02 16:30:16,209 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,219 p=28431 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-10-02 16:30:16,220 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.035) 0:03:46.291 ****** 2025-10-02 16:30:16,244 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,254 p=28431 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-10-02 16:30:16,254 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.034) 0:03:46.325 ****** 2025-10-02 16:30:16,281 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,293 p=28431 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-10-02 16:30:16,293 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.039) 0:03:46.364 ****** 2025-10-02 16:30:16,328 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,337 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:16,337 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.043) 0:03:46.409 ****** 2025-10-02 16:30:16,407 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:16,422 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:16,422 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.084) 0:03:46.493 ****** 2025-10-02 16:30:16,504 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:16,516 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:16,516 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.093) 0:03:46.587 ****** 2025-10-02 16:30:16,618 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2025-10-02 16:30:16,631 p=28431 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:30:16,631 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.115) 0:03:46.703 ****** 2025-10-02 16:30:16,676 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:16,686 p=28431 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:30:16,687 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.055) 0:03:46.758 ****** 2025-10-02 16:30:16,913 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:16,925 p=28431 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:30:16,925 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.238) 0:03:46.996 ****** 2025-10-02 16:30:16,941 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:16,950 p=28431 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:30:16,950 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:16 +0000 (0:00:00.024) 0:03:47.021 ****** 2025-10-02 16:30:17,137 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:17,144 p=28431 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:30:17,144 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:17 +0000 (0:00:00.194) 0:03:47.215 ****** 2025-10-02 16:30:17,160 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:17,168 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:30:17,168 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:17 +0000 (0:00:00.023) 0:03:47.239 ****** 2025-10-02 16:30:17,338 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:17,346 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:30:17,346 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:17 +0000 (0:00:00.178) 0:03:47.417 ****** 2025-10-02 16:30:17,523 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:17,533 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 16:30:17,533 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:17 +0000 (0:00:00.187) 0:03:47.604 ****** 2025-10-02 16:30:17,591 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_fetch.log 2025-10-02 16:30:28,599 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:28,618 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 16:30:28,618 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:28 +0000 (0:00:11.085) 0:03:58.690 ****** 2025-10-02 16:30:28,639 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:28,651 p=28431 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:30:28,651 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:28 +0000 (0:00:00.032) 0:03:58.722 ****** 2025-10-02 16:30:28,838 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:28,847 p=28431 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:30:28,847 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:28 +0000 (0:00:00.196) 0:03:58.919 ****** 2025-10-02 16:30:28,866 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:28,886 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:28,886 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:28 +0000 (0:00:00.038) 0:03:58.958 ****** 2025-10-02 16:30:28,935 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:28,943 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:28,943 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:28 +0000 (0:00:00.057) 0:03:59.015 ****** 2025-10-02 16:30:29,018 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,027 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:29,027 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.083) 0:03:59.098 ****** 2025-10-02 16:30:29,098 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:29,114 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:30:29,114 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.087) 0:03:59.185 ****** 2025-10-02 16:30:29,153 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,162 p=28431 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-10-02 16:30:29,162 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.047) 0:03:59.233 ****** 2025-10-02 16:30:29,183 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:29,192 p=28431 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-10-02 16:30:29,192 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.029) 0:03:59.263 ****** 2025-10-02 16:30:29,204 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:29,218 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:29,218 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.026) 0:03:59.289 ****** 2025-10-02 16:30:29,280 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,288 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:29,288 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.069) 0:03:59.359 ****** 2025-10-02 16:30:29,451 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,461 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:29,461 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.173) 0:03:59.532 ****** 2025-10-02 16:30:29,534 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:29,553 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:29,553 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.091) 0:03:59.624 ****** 2025-10-02 16:30:29,601 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,608 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:29,608 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.055) 0:03:59.679 ****** 2025-10-02 16:30:29,677 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,685 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:29,685 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.076) 0:03:59.756 ****** 2025-10-02 16:30:29,753 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:29,765 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:30:29,765 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.079) 0:03:59.836 ****** 2025-10-02 16:30:29,803 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,811 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-10-02 16:30:29,811 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.045) 0:03:59.882 ****** 2025-10-02 16:30:29,824 p=28431 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-10-02 16:30:29,832 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:29,832 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.021) 0:03:59.903 ****** 2025-10-02 16:30:29,879 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,886 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:29,886 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.053) 0:03:59.957 ****** 2025-10-02 16:30:29,960 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:29,969 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:29,969 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:29 +0000 (0:00:00.082) 0:04:00.040 ****** 2025-10-02 16:30:30,049 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,083 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:30,083 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.113) 0:04:00.154 ****** 2025-10-02 16:30:30,137 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:30,145 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:30,145 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.062) 0:04:00.216 ****** 2025-10-02 16:30:30,228 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:30,236 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:30,237 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.091) 0:04:00.308 ****** 2025-10-02 16:30:30,316 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,329 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:30:30,330 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.092) 0:04:00.401 ****** 2025-10-02 16:30:30,375 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:30,384 p=28431 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 16:30:30,384 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.054) 0:04:00.455 ****** 2025-10-02 16:30:30,409 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-10-02 16:30:30,414 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-10-02 16:30:30,416 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,425 p=28431 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-10-02 16:30:30,425 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.040) 0:04:00.496 ****** 2025-10-02 16:30:30,446 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,455 p=28431 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-10-02 16:30:30,455 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.030) 0:04:00.526 ****** 2025-10-02 16:30:30,481 p=28431 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) 2025-10-02 16:30:30,483 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,492 p=28431 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-10-02 16:30:30,492 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.037) 0:04:00.563 ****** 2025-10-02 16:30:30,516 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,524 p=28431 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-10-02 16:30:30,524 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.031) 0:04:00.595 ****** 2025-10-02 16:30:30,544 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,552 p=28431 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-10-02 16:30:30,552 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.028) 0:04:00.623 ****** 2025-10-02 16:30:30,573 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,581 p=28431 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-10-02 16:30:30,581 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.028) 0:04:00.652 ****** 2025-10-02 16:30:30,604 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,613 p=28431 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-10-02 16:30:30,613 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.032) 0:04:00.684 ****** 2025-10-02 16:30:30,634 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,643 p=28431 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-10-02 16:30:30,643 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.029) 0:04:00.714 ****** 2025-10-02 16:30:30,664 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,673 p=28431 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:30:30,674 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.030) 0:04:00.745 ****** 2025-10-02 16:30:30,696 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,711 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:30,711 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.037) 0:04:00.782 ****** 2025-10-02 16:30:30,768 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:30,776 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:30,776 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.064) 0:04:00.847 ****** 2025-10-02 16:30:30,849 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:30,858 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:30,858 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.082) 0:04:00.929 ****** 2025-10-02 16:30:30,930 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:30,950 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:30:30,950 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:30 +0000 (0:00:00.091) 0:04:01.021 ****** 2025-10-02 16:30:31,002 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:31,011 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:30:31,011 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.060) 0:04:01.082 ****** 2025-10-02 16:30:31,093 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:31,101 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:30:31,101 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.090) 0:04:01.172 ****** 2025-10-02 16:30:31,175 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:31,190 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:30:31,190 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.089) 0:04:01.261 ****** 2025-10-02 16:30:31,244 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:31,254 p=28431 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-10-02 16:30:31,254 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.063) 0:04:01.325 ****** 2025-10-02 16:30:31,363 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 16:30:31,363 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.109) 0:04:01.434 ****** 2025-10-02 16:30:31,550 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:31,568 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-10-02 16:30:31,568 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:31 +0000 (0:00:00.205) 0:04:01.639 ****** 2025-10-02 16:30:32,345 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:32,354 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:30:32,354 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:32 +0000 (0:00:00.785) 0:04:02.425 ****** 2025-10-02 16:30:32,800 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:32,809 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-10-02 16:30:32,809 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:32 +0000 (0:00:00.455) 0:04:02.881 ****** 2025-10-02 16:30:33,507 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:33,516 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-10-02 16:30:33,516 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:33 +0000 (0:00:00.707) 0:04:03.588 ****** 2025-10-02 16:30:33,839 p=28431 u=zuul n=ansible | changed: [localhost -> compute-0(38.102.83.180)] => (item=compute-0) 2025-10-02 16:30:34,078 p=28431 u=zuul n=ansible | changed: [localhost -> compute-1(38.102.83.220)] => (item=compute-1) 2025-10-02 16:30:34,362 p=28431 u=zuul n=ansible | changed: [localhost -> compute-2(38.102.83.166)] => (item=compute-2) 2025-10-02 16:30:35,109 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=crc) 2025-10-02 16:30:35,460 p=28431 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.201)] => (item=controller) 2025-10-02 16:30:35,629 p=28431 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-10-02 16:30:35,632 p=28431 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-10-02 16:30:35,652 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-10-02 16:30:35,652 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:35 +0000 (0:00:02.135) 0:04:05.724 ****** 2025-10-02 16:30:35,693 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:35,712 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-10-02 16:30:35,712 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:35 +0000 (0:00:00.059) 0:04:05.783 ****** 2025-10-02 16:30:36,522 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:36,530 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-10-02 16:30:36,530 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:36 +0000 (0:00:00.817) 0:04:06.601 ****** 2025-10-02 16:30:36,562 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-10-02 16:30:36,573 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-10-02 16:30:36,573 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:36 +0000 (0:00:00.042) 0:04:06.644 ****** 2025-10-02 16:30:37,068 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=1) 2025-10-02 16:30:37,539 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=2) 2025-10-02 16:30:37,974 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=3) 2025-10-02 16:30:38,428 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=4) 2025-10-02 16:30:38,819 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=5) 2025-10-02 16:30:39,359 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=6) 2025-10-02 16:30:39,875 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=7) 2025-10-02 16:30:40,358 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=8) 2025-10-02 16:30:40,804 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=9) 2025-10-02 16:30:41,314 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=10) 2025-10-02 16:30:41,794 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=11) 2025-10-02 16:30:42,242 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=12) 2025-10-02 16:30:42,739 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=13) 2025-10-02 16:30:43,302 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=14) 2025-10-02 16:30:43,844 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=15) 2025-10-02 16:30:44,344 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=16) 2025-10-02 16:30:44,822 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=17) 2025-10-02 16:30:45,373 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=18) 2025-10-02 16:30:45,857 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=19) 2025-10-02 16:30:46,362 p=28431 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=20) 2025-10-02 16:30:46,382 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-10-02 16:30:46,382 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:46 +0000 (0:00:09.809) 0:04:16.453 ****** 2025-10-02 16:30:46,792 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:46,802 p=28431 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-10-02 16:30:46,802 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:46 +0000 (0:00:00.419) 0:04:16.873 ****** 2025-10-02 16:30:47,860 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:47,877 p=28431 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-10-02 16:30:47,877 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:47 +0000 (0:00:01.075) 0:04:17.948 ****** 2025-10-02 16:30:47,903 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:47,913 p=28431 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-10-02 16:30:47,914 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:47 +0000 (0:00:00.036) 0:04:17.985 ****** 2025-10-02 16:30:48,044 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-10-02 16:30:48,045 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.131) 0:04:18.116 ****** 2025-10-02 16:30:48,066 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:48,075 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-10-02 16:30:48,076 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.030) 0:04:18.147 ****** 2025-10-02 16:30:48,105 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:30:48,113 p=28431 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-10-02 16:30:48,113 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.037) 0:04:18.184 ****** 2025-10-02 16:30:48,133 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:48,141 p=28431 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-10-02 16:30:48,141 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.028) 0:04:18.213 ****** 2025-10-02 16:30:48,190 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-10-02 16:30:48,190 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.048) 0:04:18.261 ****** 2025-10-02 16:30:48,215 p=28431 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:30:48,225 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-10-02 16:30:48,225 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.034) 0:04:18.296 ****** 2025-10-02 16:30:48,246 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:48,258 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-10-02 16:30:48,258 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:48 +0000 (0:00:00.032) 0:04:18.329 ****** 2025-10-02 16:30:48,308 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2025-10-02 16:30:49,710 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-10-02 16:30:49,712 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:30:49,731 p=28431 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-10-02 16:30:49,731 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:49 +0000 (0:00:01.472) 0:04:19.802 ****** 2025-10-02 16:30:49,784 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-10-02 16:30:49,784 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:49 +0000 (0:00:00.053) 0:04:19.855 ****** 2025-10-02 16:30:49,819 p=28431 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_IMG: 38.102.83.74:5001/openstack-k8s-operators/openstack-operator-index:c285f7662d2d520fb14d6b960fdf00d88db14929 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:30:49,830 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-10-02 16:30:49,830 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:49 +0000 (0:00:00.045) 0:04:19.901 ****** 2025-10-02 16:30:49,852 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:30:49,864 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-10-02 16:30:49,864 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:30:49 +0000 (0:00:00.033) 0:04:19.935 ****** 2025-10-02 16:30:49,916 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run.log 2025-10-02 16:33:59,385 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-10-02 16:33:59,388 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:33:59,404 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-10-02 16:33:59,404 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:33:59 +0000 (0:03:09.540) 0:07:29.475 ****** 2025-10-02 16:35:00,483 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:35:00,491 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-10-02 16:35:00,491 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:00 +0000 (0:01:01.087) 0:08:30.562 ****** 2025-10-02 16:35:01,161 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:35:01,172 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-10-02 16:35:01,173 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:01 +0000 (0:00:00.681) 0:08:31.244 ****** 2025-10-02 16:35:02,173 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:35:02,182 p=28431 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-10-02 16:35:02,182 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:02 +0000 (0:00:01.009) 0:08:32.254 ****** 2025-10-02 16:35:02,239 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-10-02 16:35:02,239 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:02 +0000 (0:00:00.056) 0:08:32.310 ****** 2025-10-02 16:35:02,267 p=28431 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:35:02,276 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-10-02 16:35:02,276 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:02 +0000 (0:00:00.036) 0:08:32.347 ****** 2025-10-02 16:35:02,298 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:35:02,307 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-10-02 16:35:02,307 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:35:02 +0000 (0:00:00.030) 0:08:32.378 ****** 2025-10-02 16:35:02,360 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log 2025-10-02 16:36:12,927 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-10-02 16:36:12,928 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:36:12,941 p=28431 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-10-02 16:36:12,942 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:12 +0000 (0:01:10.634) 0:09:43.013 ****** 2025-10-02 16:36:12,962 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:12,970 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-10-02 16:36:12,970 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:12 +0000 (0:00:00.028) 0:09:43.041 ****** 2025-10-02 16:36:12,996 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:13,004 p=28431 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-10-02 16:36:13,004 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:13 +0000 (0:00:00.033) 0:09:43.075 ****** 2025-10-02 16:36:13,058 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-10-02 16:36:13,058 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:13 +0000 (0:00:00.054) 0:09:43.130 ****** 2025-10-02 16:36:13,089 p=28431 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:36:13,097 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-10-02 16:36:13,097 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:13 +0000 (0:00:00.038) 0:09:43.168 ****** 2025-10-02 16:36:13,117 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:13,125 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-10-02 16:36:13,125 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:13 +0000 (0:00:00.028) 0:09:43.196 ****** 2025-10-02 16:36:13,173 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log 2025-10-02 16:36:14,822 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-10-02 16:36:14,824 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:36:14,838 p=28431 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-10-02 16:36:14,838 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:14 +0000 (0:00:01.712) 0:09:44.909 ****** 2025-10-02 16:36:14,894 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-10-02 16:36:14,894 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:14 +0000 (0:00:00.056) 0:09:44.966 ****** 2025-10-02 16:36:14,920 p=28431 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:36:14,929 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-10-02 16:36:14,929 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:14 +0000 (0:00:00.034) 0:09:45.000 ****** 2025-10-02 16:36:14,950 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:14,959 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-10-02 16:36:14,959 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:14 +0000 (0:00:00.029) 0:09:45.030 ****** 2025-10-02 16:36:15,011 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log 2025-10-02 16:36:21,230 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-10-02 16:36:21,232 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:36:21,246 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2025-10-02 16:36:21,246 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:06.287) 0:09:51.317 ****** 2025-10-02 16:36:21,281 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2025-10-02 16:36:21,303 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2025-10-02 16:36:21,303 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:00.057) 0:09:51.374 ****** 2025-10-02 16:36:21,326 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:36:21,336 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2025-10-02 16:36:21,336 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:00.032) 0:09:51.407 ****** 2025-10-02 16:36:21,359 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:21,367 p=28431 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2025-10-02 16:36:21,367 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:00.031) 0:09:51.438 ****** 2025-10-02 16:36:21,391 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:36:21,402 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2025-10-02 16:36:21,403 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:00.035) 0:09:51.474 ****** 2025-10-02 16:36:21,494 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:36:21,508 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 16:36:21,508 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:21 +0000 (0:00:00.105) 0:09:51.579 ****** 2025-10-02 16:36:22,261 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:36:22,271 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2025-10-02 16:36:22,271 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:22 +0000 (0:00:00.763) 0:09:52.342 ****** 2025-10-02 16:36:22,309 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 3 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: osp-secret cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: osp-secret designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: osp-secret dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: osp-secret storageRequest: 10G openstack-cell1: replicas: 1 secret: osp-secret storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: osp-secret storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: osp-secret horizon: apiOverride: route: {} template: replicas: 1 secret: osp-secret ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: osp-secret keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: osp-secret ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: osp-secret storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: osp-secret enabled: false heatInstance: heat ceilometer: enabled: true secret: osp-secret logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: persistent: pvcStorageRequest: 20G retention: 24h strategy: persistent 2025-10-02 16:36:22,318 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2025-10-02 16:36:22,318 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:22 +0000 (0:00:00.046) 0:09:52.389 ****** 2025-10-02 16:36:22,368 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2025-10-02 16:36:22,707 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:36:22,716 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2025-10-02 16:36:22,716 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:22 +0000 (0:00:00.397) 0:09:52.787 ****** 2025-10-02 16:36:22,744 p=28431 u=zuul n=ansible | Pausing for 30 seconds 2025-10-02 16:36:52,779 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:36:52,788 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2025-10-02 16:36:52,788 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:36:52 +0000 (0:00:30.072) 0:10:22.859 ****** 2025-10-02 16:42:05,821 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:05,832 p=28431 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2025-10-02 16:42:05,832 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:05 +0000 (0:05:13.044) 0:15:35.903 ****** 2025-10-02 16:42:05,910 p=28431 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2025-10-02 16:42:05,910 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:05 +0000 (0:00:00.077) 0:15:35.981 ****** 2025-10-02 16:42:06,303 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:06,316 p=28431 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2025-10-02 16:42:06,316 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:06 +0000 (0:00:00.405) 0:15:36.387 ****** 2025-10-02 16:42:06,345 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:06,360 p=28431 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2025-10-02 16:42:06,360 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:06 +0000 (0:00:00.044) 0:15:36.432 ****** 2025-10-02 16:42:06,746 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:06,754 p=28431 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-10-02 16:42:06,754 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:06 +0000 (0:00:00.393) 0:15:36.825 ****** 2025-10-02 16:42:06,947 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:06,956 p=28431 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2025-10-02 16:42:06,956 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:06 +0000 (0:00:00.201) 0:15:37.027 ****** 2025-10-02 16:42:07,004 p=28431 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-10-02 16:42:07,004 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:07 +0000 (0:00:00.047) 0:15:37.075 ****** 2025-10-02 16:42:07,210 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:07,218 p=28431 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-10-02 16:42:07,218 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:07 +0000 (0:00:00.213) 0:15:37.289 ****** 2025-10-02 16:42:07,239 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:07,248 p=28431 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-10-02 16:42:07,248 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:07 +0000 (0:00:00.029) 0:15:37.319 ****** 2025-10-02 16:42:07,271 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:07,280 p=28431 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-10-02 16:42:07,280 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:07 +0000 (0:00:00.032) 0:15:37.351 ****** 2025-10-02 16:42:07,757 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:07,765 p=28431 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-10-02 16:42:07,765 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:07 +0000 (0:00:00.485) 0:15:37.836 ****** 2025-10-02 16:42:09,231 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:09,251 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2025-10-02 16:42:09,252 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:09 +0000 (0:00:01.486) 0:15:39.323 ****** 2025-10-02 16:42:09,581 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:09,590 p=28431 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2025-10-02 16:42:09,590 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:09 +0000 (0:00:00.338) 0:15:39.661 ****** 2025-10-02 16:42:10,010 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,026 p=28431 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:42:10,026 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.436) 0:15:40.097 ****** 2025-10-02 16:42:10,098 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,107 p=28431 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:42:10,107 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.080) 0:15:40.178 ****** 2025-10-02 16:42:10,192 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,202 p=28431 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:42:10,202 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.094) 0:15:40.273 ****** 2025-10-02 16:42:10,335 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '71 Kustomize control plane to scale openstack services', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator/ci/nova-operator-tempest-multinode/control_plane_hook.yaml'}) 2025-10-02 16:42:10,345 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '82 Kustomize and update Control Plane', 'type': 'playbook', 'source': 'control_plane_kustomize_deploy.yml'}) 2025-10-02 16:42:10,354 p=28431 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '85 Create neutron-metadata-custom', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator/ci/nova-operator-tempest-multinode/pre_deploy_hook.yml'}) 2025-10-02 16:42:10,367 p=28431 u=zuul n=ansible | TASK [run_hook : Set playbook path for 71 Kustomize control plane to scale openstack services cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:42:10,367 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.164) 0:15:40.438 ****** 2025-10-02 16:42:10,416 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,426 p=28431 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:42:10,426 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.059) 0:15:40.497 ****** 2025-10-02 16:42:10,635 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,644 p=28431 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:42:10,644 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.217) 0:15:40.715 ****** 2025-10-02 16:42:10,667 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:10,676 p=28431 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:42:10,677 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.032) 0:15:40.748 ****** 2025-10-02 16:42:10,869 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,877 p=28431 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:42:10,877 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.200) 0:15:40.948 ****** 2025-10-02 16:42:10,904 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:10,913 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:42:10,913 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:10 +0000 (0:00:00.035) 0:15:40.984 ****** 2025-10-02 16:42:11,108 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:11,125 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:42:11,125 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:11 +0000 (0:00:00.212) 0:15:41.196 ****** 2025-10-02 16:42:11,334 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:11,349 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 71 Kustomize control plane to scale openstack services] *** 2025-10-02 16:42:11,349 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:11 +0000 (0:00:00.223) 0:15:41.420 ****** 2025-10-02 16:42:11,410 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_71.log 2025-10-02 16:42:13,165 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:42:13,174 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 71 Kustomize control plane to scale openstack services] *** 2025-10-02 16:42:13,174 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:01.825) 0:15:43.245 ****** 2025-10-02 16:42:13,200 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:13,210 p=28431 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:42:13,210 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.036) 0:15:43.282 ****** 2025-10-02 16:42:13,386 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:13,395 p=28431 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:42:13,396 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.185) 0:15:43.467 ****** 2025-10-02 16:42:13,419 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:13,429 p=28431 u=zuul n=ansible | TASK [run_hook : Set playbook path for 82 Kustomize and update Control Plane cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:42:13,429 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.033) 0:15:43.500 ****** 2025-10-02 16:42:13,478 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:13,487 p=28431 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:42:13,487 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.057) 0:15:43.558 ****** 2025-10-02 16:42:13,681 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:13,689 p=28431 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:42:13,690 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.202) 0:15:43.761 ****** 2025-10-02 16:42:13,711 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:42:13,720 p=28431 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:42:13,720 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.030) 0:15:43.791 ****** 2025-10-02 16:42:13,905 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:13,915 p=28431 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:42:13,915 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.195) 0:15:43.986 ****** 2025-10-02 16:42:13,941 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:13,951 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:42:13,951 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:13 +0000 (0:00:00.035) 0:15:44.022 ****** 2025-10-02 16:42:14,141 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:14,150 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:42:14,150 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:14 +0000 (0:00:00.199) 0:15:44.221 ****** 2025-10-02 16:42:14,331 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:42:14,341 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 82 Kustomize and update Control Plane] *** 2025-10-02 16:42:14,341 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:42:14 +0000 (0:00:00.191) 0:15:44.413 ****** 2025-10-02 16:42:14,395 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_hook_without_retry_82.log 2025-10-02 16:43:23,053 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:23,064 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 82 Kustomize and update Control Plane] *** 2025-10-02 16:43:23,064 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:01:08.722) 0:16:53.135 ****** 2025-10-02 16:43:23,093 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:23,102 p=28431 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:43:23,102 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.038) 0:16:53.173 ****** 2025-10-02 16:43:23,284 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:23,291 p=28431 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:43:23,292 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.189) 0:16:53.363 ****** 2025-10-02 16:43:23,314 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:23,324 p=28431 u=zuul n=ansible | TASK [run_hook : Set playbook path for 85 Create neutron-metadata-custom cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:43:23,324 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.032) 0:16:53.395 ****** 2025-10-02 16:43:23,373 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:23,381 p=28431 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:43:23,381 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.057) 0:16:53.452 ****** 2025-10-02 16:43:23,575 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:23,586 p=28431 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:43:23,586 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.204) 0:16:53.657 ****** 2025-10-02 16:43:23,611 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:23,620 p=28431 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:43:23,620 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.033) 0:16:53.691 ****** 2025-10-02 16:43:23,803 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:23,812 p=28431 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:43:23,812 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.192) 0:16:53.883 ****** 2025-10-02 16:43:23,838 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:23,846 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:43:23,846 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:23 +0000 (0:00:00.034) 0:16:53.917 ****** 2025-10-02 16:43:24,032 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:24,040 p=28431 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:43:24,040 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:24 +0000 (0:00:00.193) 0:16:54.111 ****** 2025-10-02 16:43:24,224 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:24,238 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 85 Create neutron-metadata-custom] *** 2025-10-02 16:43:24,238 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:24 +0000 (0:00:00.198) 0:16:54.309 ****** 2025-10-02 16:43:24,294 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_run_hook_without_retry_85.log 2025-10-02 16:43:26,238 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:26,247 p=28431 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 85 Create neutron-metadata-custom] ****** 2025-10-02 16:43:26,247 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:02.008) 0:16:56.318 ****** 2025-10-02 16:43:26,273 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,282 p=28431 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:43:26,282 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.034) 0:16:56.353 ****** 2025-10-02 16:43:26,458 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:26,468 p=28431 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:43:26,468 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.186) 0:16:56.540 ****** 2025-10-02 16:43:26,490 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,505 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:43:26,505 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.036) 0:16:56.576 ****** 2025-10-02 16:43:26,676 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:26,684 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2025-10-02 16:43:26,684 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.179) 0:16:56.755 ****** 2025-10-02 16:43:26,706 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,714 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2025-10-02 16:43:26,714 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.030) 0:16:56.786 ****** 2025-10-02 16:43:26,735 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,744 p=28431 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2025-10-02 16:43:26,744 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.029) 0:16:56.815 ****** 2025-10-02 16:43:26,764 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,773 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2025-10-02 16:43:26,773 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.029) 0:16:56.844 ****** 2025-10-02 16:43:26,795 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,803 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2025-10-02 16:43:26,803 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.029) 0:16:56.874 ****** 2025-10-02 16:43:26,826 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,834 p=28431 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2025-10-02 16:43:26,834 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.030) 0:16:56.905 ****** 2025-10-02 16:43:26,857 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,866 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 16:43:26,867 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.032) 0:16:56.938 ****** 2025-10-02 16:43:26,893 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,903 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2025-10-02 16:43:26,903 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.036) 0:16:56.974 ****** 2025-10-02 16:43:26,928 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,936 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2025-10-02 16:43:26,936 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.033) 0:16:57.008 ****** 2025-10-02 16:43:26,961 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:26,969 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 16:43:26,969 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:26 +0000 (0:00:00.032) 0:16:57.040 ****** 2025-10-02 16:43:26,992 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,002 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 16:43:27,003 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.033) 0:16:57.074 ****** 2025-10-02 16:43:27,026 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,036 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 16:43:27,036 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.032) 0:16:57.107 ****** 2025-10-02 16:43:27,061 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,070 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-10-02 16:43:27,071 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.034) 0:16:57.142 ****** 2025-10-02 16:43:27,097 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,108 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2025-10-02 16:43:27,108 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.037) 0:16:57.179 ****** 2025-10-02 16:43:27,133 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,142 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2025-10-02 16:43:27,143 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.034) 0:16:57.214 ****** 2025-10-02 16:43:27,165 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,174 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2025-10-02 16:43:27,174 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.031) 0:16:57.245 ****** 2025-10-02 16:43:27,201 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,209 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2025-10-02 16:43:27,209 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.034) 0:16:57.280 ****** 2025-10-02 16:43:27,232 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,241 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2025-10-02 16:43:27,242 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.032) 0:16:57.313 ****** 2025-10-02 16:43:27,265 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,274 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2025-10-02 16:43:27,274 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.032) 0:16:57.345 ****** 2025-10-02 16:43:27,298 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,306 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2025-10-02 16:43:27,307 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.032) 0:16:57.378 ****** 2025-10-02 16:43:27,330 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,338 p=28431 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-10-02 16:43:27,338 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.031) 0:16:57.409 ****** 2025-10-02 16:43:27,365 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,379 p=28431 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:43:27,380 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.041) 0:16:57.451 ****** 2025-10-02 16:43:27,436 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:27,444 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2025-10-02 16:43:27,444 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.064) 0:16:57.515 ****** 2025-10-02 16:43:27,472 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,480 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2025-10-02 16:43:27,480 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.035) 0:16:57.551 ****** 2025-10-02 16:43:27,523 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2025-10-02 16:43:27,534 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2025-10-02 16:43:27,544 p=28431 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2025-10-02 16:43:27,545 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,553 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2025-10-02 16:43:27,553 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.072) 0:16:57.624 ****** 2025-10-02 16:43:27,581 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,589 p=28431 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2025-10-02 16:43:27,589 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.036) 0:16:57.660 ****** 2025-10-02 16:43:27,619 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,628 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2025-10-02 16:43:27,628 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.038) 0:16:57.699 ****** 2025-10-02 16:43:27,656 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,665 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2025-10-02 16:43:27,665 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.037) 0:16:57.736 ****** 2025-10-02 16:43:27,694 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,703 p=28431 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2025-10-02 16:43:27,703 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.037) 0:16:57.774 ****** 2025-10-02 16:43:27,737 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,751 p=28431 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2025-10-02 16:43:27,751 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.048) 0:16:57.822 ****** 2025-10-02 16:43:27,780 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:27,789 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-10-02 16:43:27,789 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.037) 0:16:57.860 ****** 2025-10-02 16:43:27,826 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:27,834 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-10-02 16:43:27,834 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:27 +0000 (0:00:00.045) 0:16:57.905 ****** 2025-10-02 16:43:28,243 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:28,252 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-10-02 16:43:28,252 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:28 +0000 (0:00:00.417) 0:16:58.323 ****** 2025-10-02 16:43:28,286 p=28431 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:43:28,294 p=28431 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-10-02 16:43:28,294 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:28 +0000 (0:00:00.041) 0:16:58.365 ****** 2025-10-02 16:43:28,343 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2025-10-02 16:43:28,343 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:28 +0000 (0:00:00.049) 0:16:58.414 ****** 2025-10-02 16:43:28,374 p=28431 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: a0eac564d779a7eaac46c9816bff261a DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 3 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw 2025-10-02 16:43:28,383 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2025-10-02 16:43:28,383 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:28 +0000 (0:00:00.039) 0:16:58.454 ****** 2025-10-02 16:43:28,408 p=28431 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:43:28,417 p=28431 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2025-10-02 16:43:28,418 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:28 +0000 (0:00:00.034) 0:16:58.489 ****** 2025-10-02 16:43:28,477 p=28431 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_015_run_edpm_deploy.log 2025-10-02 16:43:38,999 p=28431 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2025-10-02 16:43:39,000 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:39,016 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-10-02 16:43:39,016 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:39 +0000 (0:00:10.598) 0:17:09.088 ****** 2025-10-02 16:43:39,532 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:39,541 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-10-02 16:43:39,541 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:39 +0000 (0:00:00.524) 0:17:09.612 ****** 2025-10-02 16:43:39,577 p=28431 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 3 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/98-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: | [libvirt] cpu_mode = custom cpu_models = Nehalem kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 199.204.44.24 edpm_container_registry_insecure_registries: - 38.102.83.74:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 enable_debug: false gather_facts: false image_prefix: openstack image_tag: a0eac564d779a7eaac46c9816bff261a neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 edpm-compute-2: ansible: ansibleHost: 192.168.122.102 hostName: compute-2 networks: - defaultRoute: false fixedIP: 192.168.122.102 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata-custom - libvirt - nova - telemetry tlsEnabled: true 2025-10-02 16:43:39,585 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-10-02 16:43:39,585 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:39 +0000 (0:00:00.043) 0:17:09.656 ****** 2025-10-02 16:43:40,493 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:40,502 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-10-02 16:43:40,502 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:40 +0000 (0:00:00.917) 0:17:10.573 ****** 2025-10-02 16:43:41,608 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:41,618 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-10-02 16:43:41,618 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:41 +0000 (0:00:01.115) 0:17:11.689 ****** 2025-10-02 16:43:42,390 p=28431 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:43:42,401 p=28431 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-10-02 16:43:42,402 p=28431 u=zuul n=ansible | Thursday 02 October 2025 16:43:42 +0000 (0:00:00.783) 0:17:12.473 ****** 2025-10-02 16:54:31,620 p=33521 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-10-02 16:54:31,670 p=33521 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-10-02 16:54:31,670 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:31 +0000 (0:00:00.069) 0:00:00.069 ****** 2025-10-02 16:54:32,003 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:32,018 p=33521 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-10-02 16:54:32,019 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.348) 0:00:00.418 ****** 2025-10-02 16:54:32,048 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-10-02 16:54:32,101 p=33521 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-10-02 16:54:32,101 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.082) 0:00:00.501 ****** 2025-10-02 16:54:32,122 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:32,134 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 16:54:32,134 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.032) 0:00:00.533 ****** 2025-10-02 16:54:32,195 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:32,205 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-10-02 16:54:32,205 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.070) 0:00:00.604 ****** 2025-10-02 16:54:32,276 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:32,290 p=33521 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-10-02 16:54:32,291 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.085) 0:00:00.690 ****** 2025-10-02 16:54:32,491 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:32,502 p=33521 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-10-02 16:54:32,502 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.211) 0:00:00.902 ****** 2025-10-02 16:54:32,518 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:32,530 p=33521 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-10-02 16:54:32,530 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.027) 0:00:00.929 ****** 2025-10-02 16:54:32,548 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:32,558 p=33521 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-10-02 16:54:32,558 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.028) 0:00:00.958 ****** 2025-10-02 16:54:32,576 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:32,587 p=33521 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-10-02 16:54:32,587 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:32 +0000 (0:00:00.028) 0:00:00.986 ****** 2025-10-02 16:54:34,199 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:34,216 p=33521 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 16:54:34,216 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:34 +0000 (0:00:01.629) 0:00:02.615 ****** 2025-10-02 16:54:34,421 p=33521 u=zuul n=ansible | ok: [localhost] => (item=tmp) 2025-10-02 16:54:34,593 p=33521 u=zuul n=ansible | ok: [localhost] => (item=artifacts/repositories) 2025-10-02 16:54:34,782 p=33521 u=zuul n=ansible | ok: [localhost] => (item=venv/repo_setup) 2025-10-02 16:54:34,791 p=33521 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-10-02 16:54:34,792 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:34 +0000 (0:00:00.575) 0:00:03.191 ****** 2025-10-02 16:54:36,169 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:36,179 p=33521 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-10-02 16:54:36,179 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:36 +0000 (0:00:01.387) 0:00:04.578 ****** 2025-10-02 16:54:36,765 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:36,776 p=33521 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-10-02 16:54:36,776 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:36 +0000 (0:00:00.597) 0:00:05.176 ****** 2025-10-02 16:54:38,473 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:38,485 p=33521 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-10-02 16:54:38,485 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:38 +0000 (0:00:01.708) 0:00:06.885 ****** 2025-10-02 16:54:38,689 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:38,699 p=33521 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-10-02 16:54:38,700 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:38 +0000 (0:00:00.214) 0:00:07.099 ****** 2025-10-02 16:54:38,729 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:38,741 p=33521 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-10-02 16:54:38,741 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:38 +0000 (0:00:00.041) 0:00:07.140 ****** 2025-10-02 16:54:39,367 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:39,378 p=33521 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-10-02 16:54:39,378 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:39 +0000 (0:00:00.636) 0:00:07.777 ****** 2025-10-02 16:54:39,412 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:39,422 p=33521 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-10-02 16:54:39,422 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:39 +0000 (0:00:00.044) 0:00:07.822 ****** 2025-10-02 16:54:39,461 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:39,471 p=33521 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-10-02 16:54:39,471 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:39 +0000 (0:00:00.048) 0:00:07.870 ****** 2025-10-02 16:54:39,500 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:39,512 p=33521 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-10-02 16:54:39,512 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:39 +0000 (0:00:00.041) 0:00:07.912 ****** 2025-10-02 16:54:39,976 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:39,987 p=33521 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 16:54:39,987 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:39 +0000 (0:00:00.474) 0:00:08.386 ****** 2025-10-02 16:54:40,664 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:40,674 p=33521 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-10-02 16:54:40,674 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.687) 0:00:09.074 ****** 2025-10-02 16:54:40,691 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,705 p=33521 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-10-02 16:54:40,705 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.030) 0:00:09.104 ****** 2025-10-02 16:54:40,722 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,733 p=33521 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-10-02 16:54:40,734 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.028) 0:00:09.133 ****** 2025-10-02 16:54:40,751 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,763 p=33521 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-10-02 16:54:40,764 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.030) 0:00:09.163 ****** 2025-10-02 16:54:40,845 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:40,854 p=33521 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-10-02 16:54:40,854 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.090) 0:00:09.254 ****** 2025-10-02 16:54:40,870 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,882 p=33521 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-10-02 16:54:40,882 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.027) 0:00:09.281 ****** 2025-10-02 16:54:40,899 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,912 p=33521 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-10-02 16:54:40,912 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.030) 0:00:09.311 ****** 2025-10-02 16:54:40,927 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,940 p=33521 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-10-02 16:54:40,940 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.028) 0:00:09.340 ****** 2025-10-02 16:54:40,955 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,966 p=33521 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-10-02 16:54:40,966 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.025) 0:00:09.365 ****** 2025-10-02 16:54:40,980 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:40,993 p=33521 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-10-02 16:54:40,993 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:40 +0000 (0:00:00.027) 0:00:09.393 ****** 2025-10-02 16:54:41,009 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:41,022 p=33521 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-10-02 16:54:41,022 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:41 +0000 (0:00:00.028) 0:00:09.421 ****** 2025-10-02 16:54:41,037 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:41,048 p=33521 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-10-02 16:54:41,048 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:41 +0000 (0:00:00.026) 0:00:09.448 ****** 2025-10-02 16:54:41,234 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:41,247 p=33521 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-10-02 16:54:41,247 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:41 +0000 (0:00:00.198) 0:00:09.646 ****** 2025-10-02 16:54:41,457 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:41,467 p=33521 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-10-02 16:54:41,467 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:41 +0000 (0:00:00.219) 0:00:09.866 ****** 2025-10-02 16:54:41,699 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:41,710 p=33521 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-10-02 16:54:41,710 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:41 +0000 (0:00:00.242) 0:00:10.109 ****** 2025-10-02 16:54:42,278 p=33521 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.74:8766/gating.repo 2025-10-02 16:54:42,279 p=33521 u=zuul n=ansible | ...ignoring 2025-10-02 16:54:42,290 p=33521 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-10-02 16:54:42,290 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.580) 0:00:10.689 ****** 2025-10-02 16:54:42,321 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:42,333 p=33521 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-10-02 16:54:42,334 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.043) 0:00:10.733 ****** 2025-10-02 16:54:42,362 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:42,373 p=33521 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-10-02 16:54:42,374 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.040) 0:00:10.773 ****** 2025-10-02 16:54:42,401 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:42,412 p=33521 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-10-02 16:54:42,412 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.038) 0:00:10.811 ****** 2025-10-02 16:54:42,439 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:42,450 p=33521 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-10-02 16:54:42,450 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.038) 0:00:10.850 ****** 2025-10-02 16:54:42,479 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:54:42,490 p=33521 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-10-02 16:54:42,491 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.040) 0:00:10.890 ****** 2025-10-02 16:54:42,811 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:54:42,822 p=33521 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-10-02 16:54:42,822 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:42 +0000 (0:00:00.331) 0:00:11.221 ****** 2025-10-02 16:54:43,044 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/delorean-antelope-testing.repo) 2025-10-02 16:54:43,247 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/delorean.repo) 2025-10-02 16:54:43,446 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/repo-setup-centos-appstream.repo) 2025-10-02 16:54:43,654 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/repo-setup-centos-baseos.repo) 2025-10-02 16:54:43,866 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/repo-setup-centos-highavailability.repo) 2025-10-02 16:54:44,063 p=33521 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/repo-setup-centos-powertools.repo) 2025-10-02 16:54:44,073 p=33521 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-10-02 16:54:44,074 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:44 +0000 (0:00:01.251) 0:00:12.473 ****** 2025-10-02 16:54:44,575 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:44,584 p=33521 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-10-02 16:54:44,584 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:44 +0000 (0:00:00.510) 0:00:12.983 ****** 2025-10-02 16:54:44,842 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:54:44,864 p=33521 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-10-02 16:54:44,864 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:44 +0000 (0:00:00.280) 0:00:13.263 ****** 2025-10-02 16:54:44,903 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-10-02 16:54:44,920 p=33521 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-10-02 16:54:44,920 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:44 +0000 (0:00:00.055) 0:00:13.319 ****** 2025-10-02 16:54:44,938 p=33521 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-10-02 16:54:44,949 p=33521 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-10-02 16:54:44,949 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:54:44 +0000 (0:00:00.028) 0:00:13.348 ****** 2025-10-02 16:55:10,988 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:10,998 p=33521 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-10-02 16:55:10,998 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:10 +0000 (0:00:26.049) 0:00:39.397 ****** 2025-10-02 16:55:11,288 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:11,302 p=33521 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-10-02 16:55:11,302 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:11 +0000 (0:00:00.303) 0:00:39.701 ****** 2025-10-02 16:55:11,502 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:11,515 p=33521 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-10-02 16:55:11,515 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:11 +0000 (0:00:00.213) 0:00:39.914 ****** 2025-10-02 16:55:11,622 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:11,632 p=33521 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-10-02 16:55:11,632 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:11 +0000 (0:00:00.117) 0:00:40.032 ****** 2025-10-02 16:55:11,655 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:11,667 p=33521 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-10-02 16:55:11,667 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:11 +0000 (0:00:00.034) 0:00:40.066 ****** 2025-10-02 16:55:11,832 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:11,842 p=33521 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-10-02 16:55:11,842 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:11 +0000 (0:00:00.175) 0:00:40.241 ****** 2025-10-02 16:55:12,123 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:12,139 p=33521 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-10-02 16:55:12,139 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.297) 0:00:40.539 ****** 2025-10-02 16:55:12,154 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,170 p=33521 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-10-02 16:55:12,170 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.030) 0:00:40.569 ****** 2025-10-02 16:55:12,187 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,205 p=33521 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-10-02 16:55:12,205 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.035) 0:00:40.604 ****** 2025-10-02 16:55:12,221 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,233 p=33521 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-10-02 16:55:12,234 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.028) 0:00:40.633 ****** 2025-10-02 16:55:12,248 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,259 p=33521 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-10-02 16:55:12,259 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.025) 0:00:40.659 ****** 2025-10-02 16:55:12,273 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,285 p=33521 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-10-02 16:55:12,285 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.026) 0:00:40.685 ****** 2025-10-02 16:55:12,305 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:12,317 p=33521 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-10-02 16:55:12,317 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:12 +0000 (0:00:00.031) 0:00:40.716 ****** 2025-10-02 16:55:12,587 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-10-02 16:55:12,799 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-10-02 16:55:13,018 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-10-02 16:55:13,237 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-10-02 16:55:13,427 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 16:55:13,452 p=33521 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-10-02 16:55:13,453 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:13 +0000 (0:00:01.135) 0:00:41.852 ****** 2025-10-02 16:55:13,591 p=33521 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-10-02 16:55:13,591 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:13 +0000 (0:00:00.138) 0:00:41.990 ****** 2025-10-02 16:55:13,809 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-10-02 16:55:13,981 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-10-02 16:55:14,166 p=33521 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-10-02 16:55:14,177 p=33521 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-10-02 16:55:14,177 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.586) 0:00:42.576 ****** 2025-10-02 16:55:14,219 p=33521 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-10-02 16:55:14,219 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.041) 0:00:42.618 ****** 2025-10-02 16:55:14,264 p=33521 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) 2025-10-02 16:55:14,275 p=33521 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-10-02 16:55:14,275 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.056) 0:00:42.674 ****** 2025-10-02 16:55:14,323 p=33521 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) => msg: | _repo_operator_name: nova _repo_operator_info: [{'key': 'NOVA_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator'}, {'key': 'NOVA_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'NOVA_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/nova-operator', 'NOVA_BRANCH': ''} 2025-10-02 16:55:14,345 p=33521 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-10-02 16:55:14,345 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.070) 0:00:42.744 ****** 2025-10-02 16:55:14,414 p=33521 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2025-10-02 16:55:14,426 p=33521 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-10-02 16:55:14,426 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.080) 0:00:42.825 ****** 2025-10-02 16:55:14,467 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:14,478 p=33521 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-10-02 16:55:14,478 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:14 +0000 (0:00:00.051) 0:00:42.877 ****** 2025-10-02 16:55:15,007 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:15,018 p=33521 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-10-02 16:55:15,018 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.540) 0:00:43.417 ****** 2025-10-02 16:55:15,224 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:15,236 p=33521 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-10-02 16:55:15,236 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.217) 0:00:43.635 ****** 2025-10-02 16:55:15,281 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:15,298 p=33521 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-10-02 16:55:15,298 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.061) 0:00:43.697 ****** 2025-10-02 16:55:15,818 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:15,828 p=33521 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-10-02 16:55:15,828 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.530) 0:00:44.227 ****** 2025-10-02 16:55:15,854 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:15,863 p=33521 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-10-02 16:55:15,863 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.034) 0:00:44.262 ****** 2025-10-02 16:55:15,881 p=33521 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2025-10-02 16:55:15,891 p=33521 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-10-02 16:55:15,891 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.028) 0:00:44.290 ****** 2025-10-02 16:55:15,921 p=33521 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '1234567842' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: '' NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12345678' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: osp-secret SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: tests/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_PWD:' 2025-10-02 16:55:15,931 p=33521 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-10-02 16:55:15,931 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:15 +0000 (0:00:00.039) 0:00:44.330 ****** 2025-10-02 16:55:16,263 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:16,312 p=33521 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-10-02 16:55:16,312 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:16 +0000 (0:00:00.380) 0:00:44.711 ****** 2025-10-02 16:55:16,332 p=33521 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-10-02 16:55:16,341 p=33521 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:55:16,341 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:16 +0000 (0:00:00.029) 0:00:44.741 ****** 2025-10-02 16:55:16,797 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:16,807 p=33521 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-10-02 16:55:16,807 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:16 +0000 (0:00:00.465) 0:00:45.206 ****** 2025-10-02 16:55:16,825 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:16,851 p=33521 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-10-02 16:55:16,851 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:16 +0000 (0:00:00.044) 0:00:45.250 ****** 2025-10-02 16:55:17,261 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:17,271 p=33521 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-10-02 16:55:17,271 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:17 +0000 (0:00:00.419) 0:00:45.670 ****** 2025-10-02 16:55:17,293 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:17,316 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-10-02 16:55:17,316 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:17 +0000 (0:00:00.045) 0:00:45.715 ****** 2025-10-02 16:55:17,725 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:17,741 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:55:17,741 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:17 +0000 (0:00:00.425) 0:00:46.141 ****** 2025-10-02 16:55:17,803 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:17,812 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:55:17,812 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:17 +0000 (0:00:00.070) 0:00:46.212 ****** 2025-10-02 16:55:17,887 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:17,898 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:55:17,899 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:17 +0000 (0:00:00.086) 0:00:46.298 ****** 2025-10-02 16:55:17,997 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-10-02 16:55:18,010 p=33521 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:55:18,010 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.111) 0:00:46.410 ****** 2025-10-02 16:55:18,051 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,061 p=33521 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:55:18,061 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.050) 0:00:46.460 ****** 2025-10-02 16:55:18,247 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,258 p=33521 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:55:18,258 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.196) 0:00:46.657 ****** 2025-10-02 16:55:18,270 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:18,279 p=33521 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:55:18,279 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.021) 0:00:46.678 ****** 2025-10-02 16:55:18,447 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,459 p=33521 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:55:18,460 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.180) 0:00:46.859 ****** 2025-10-02 16:55:18,478 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,487 p=33521 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:55:18,487 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.027) 0:00:46.887 ****** 2025-10-02 16:55:18,680 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,692 p=33521 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:55:18,692 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.205) 0:00:47.092 ****** 2025-10-02 16:55:18,916 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:18,928 p=33521 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-10-02 16:55:18,928 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:18 +0000 (0:00:00.235) 0:00:47.328 ****** 2025-10-02 16:55:18,983 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_016_run_hook_without_retry.log 2025-10-02 16:55:45,966 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:45,976 p=33521 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-10-02 16:55:45,977 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:45 +0000 (0:00:27.048) 0:01:14.376 ****** 2025-10-02 16:55:45,995 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,008 p=33521 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:55:46,008 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.031) 0:01:14.407 ****** 2025-10-02 16:55:46,199 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:46,210 p=33521 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:55:46,210 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.201) 0:01:14.609 ****** 2025-10-02 16:55:46,223 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,263 p=33521 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-10-02 16:55:46,285 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:55:46,285 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.075) 0:01:14.684 ****** 2025-10-02 16:55:46,327 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:46,336 p=33521 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-10-02 16:55:46,336 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.050) 0:01:14.735 ****** 2025-10-02 16:55:46,357 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,367 p=33521 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-10-02 16:55:46,367 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.031) 0:01:14.766 ****** 2025-10-02 16:55:46,384 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,424 p=33521 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-10-02 16:55:46,464 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:55:46,465 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.097) 0:01:14.864 ****** 2025-10-02 16:55:46,506 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:46,517 p=33521 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 16:55:46,517 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.052) 0:01:14.916 ****** 2025-10-02 16:55:46,684 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:46,732 p=33521 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-10-02 16:55:46,732 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.215) 0:01:15.131 ****** 2025-10-02 16:55:46,752 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,762 p=33521 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-10-02 16:55:46,762 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.030) 0:01:15.162 ****** 2025-10-02 16:55:46,782 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,792 p=33521 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-10-02 16:55:46,793 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.030) 0:01:15.192 ****** 2025-10-02 16:55:46,813 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,831 p=33521 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-10-02 16:55:46,832 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.039) 0:01:15.231 ****** 2025-10-02 16:55:46,853 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,865 p=33521 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-10-02 16:55:46,865 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.033) 0:01:15.265 ****** 2025-10-02 16:55:46,885 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,895 p=33521 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-10-02 16:55:46,895 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.029) 0:01:15.295 ****** 2025-10-02 16:55:46,914 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:46,924 p=33521 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:55:46,924 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:46 +0000 (0:00:00.029) 0:01:15.324 ****** 2025-10-02 16:55:47,103 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:47,113 p=33521 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-10-02 16:55:47,113 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.188) 0:01:15.512 ****** 2025-10-02 16:55:47,145 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-10-02 16:55:47,160 p=33521 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:55:47,161 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.047) 0:01:15.560 ****** 2025-10-02 16:55:47,182 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,192 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-10-02 16:55:47,192 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.031) 0:01:15.591 ****** 2025-10-02 16:55:47,217 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,227 p=33521 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-10-02 16:55:47,227 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.035) 0:01:15.626 ****** 2025-10-02 16:55:47,247 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,258 p=33521 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-10-02 16:55:47,258 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.030) 0:01:15.657 ****** 2025-10-02 16:55:47,290 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:47,300 p=33521 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:55:47,300 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.042) 0:01:15.700 ****** 2025-10-02 16:55:47,505 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:47,519 p=33521 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-10-02 16:55:47,519 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.218) 0:01:15.918 ****** 2025-10-02 16:55:47,543 p=33521 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:55:47,554 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-10-02 16:55:47,555 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.035) 0:01:15.954 ****** 2025-10-02 16:55:47,576 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,589 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-10-02 16:55:47,589 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.034) 0:01:15.988 ****** 2025-10-02 16:55:47,610 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,620 p=33521 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-10-02 16:55:47,620 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.031) 0:01:16.020 ****** 2025-10-02 16:55:47,641 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,655 p=33521 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-10-02 16:55:47,655 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.034) 0:01:16.054 ****** 2025-10-02 16:55:47,681 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:47,691 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-10-02 16:55:47,691 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.035) 0:01:16.090 ****** 2025-10-02 16:55:47,717 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-10-02 16:55:47,729 p=33521 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:55:47,729 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.037) 0:01:16.128 ****** 2025-10-02 16:55:47,745 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:47,755 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-10-02 16:55:47,755 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:47 +0000 (0:00:00.026) 0:01:16.154 ****** 2025-10-02 16:55:47,810 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_017_fetch_openshift.log 2025-10-02 16:55:48,823 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:48,833 p=33521 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-10-02 16:55:48,833 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:48 +0000 (0:00:01.078) 0:01:17.232 ****** 2025-10-02 16:55:48,863 p=33521 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-10-02 16:55:48,875 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-10-02 16:55:48,875 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:48 +0000 (0:00:00.042) 0:01:17.274 ****** 2025-10-02 16:55:49,218 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:49,231 p=33521 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-10-02 16:55:49,231 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:49 +0000 (0:00:00.355) 0:01:17.630 ****** 2025-10-02 16:55:49,256 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:49,268 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-10-02 16:55:49,268 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:49 +0000 (0:00:00.036) 0:01:17.667 ****** 2025-10-02 16:55:49,675 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:49,684 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-10-02 16:55:49,684 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:49 +0000 (0:00:00.415) 0:01:18.083 ****** 2025-10-02 16:55:49,969 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:49,982 p=33521 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-10-02 16:55:49,982 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:49 +0000 (0:00:00.298) 0:01:18.382 ****** 2025-10-02 16:55:50,277 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:50,289 p=33521 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-10-02 16:55:50,289 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:50 +0000 (0:00:00.306) 0:01:18.688 ****** 2025-10-02 16:55:50,331 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:50,389 p=33521 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-10-02 16:55:50,389 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:50 +0000 (0:00:00.099) 0:01:18.788 ****** 2025-10-02 16:55:50,842 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:50,854 p=33521 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-10-02 16:55:50,855 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:50 +0000 (0:00:00.465) 0:01:19.254 ****** 2025-10-02 16:55:51,171 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:51,181 p=33521 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-10-02 16:55:51,182 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:51 +0000 (0:00:00.327) 0:01:19.581 ****** 2025-10-02 16:55:51,656 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:55:51,679 p=33521 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:55:51,679 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:51 +0000 (0:00:00.497) 0:01:20.079 ****** 2025-10-02 16:55:51,884 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:51,895 p=33521 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-10-02 16:55:51,895 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:51 +0000 (0:00:00.215) 0:01:20.294 ****** 2025-10-02 16:55:51,923 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:51,941 p=33521 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-10-02 16:55:51,941 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:51 +0000 (0:00:00.046) 0:01:20.341 ****** 2025-10-02 16:55:52,975 p=33521 u=zuul n=ansible | ok: [localhost] => (item=openstack) 2025-10-02 16:55:53,776 p=33521 u=zuul n=ansible | ok: [localhost] => (item=openstack-operators) 2025-10-02 16:55:53,790 p=33521 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-10-02 16:55:53,790 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:01.848) 0:01:22.189 ****** 2025-10-02 16:55:53,806 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,816 p=33521 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-10-02 16:55:53,816 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.025) 0:01:22.215 ****** 2025-10-02 16:55:53,837 p=33521 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-10-02 16:55:53,838 p=33521 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-10-02 16:55:53,839 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,850 p=33521 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-10-02 16:55:53,850 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.034) 0:01:22.249 ****** 2025-10-02 16:55:53,872 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,882 p=33521 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-10-02 16:55:53,883 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.032) 0:01:22.282 ****** 2025-10-02 16:55:53,903 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,913 p=33521 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-10-02 16:55:53,913 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.030) 0:01:22.312 ****** 2025-10-02 16:55:53,933 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,946 p=33521 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-10-02 16:55:53,946 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.032) 0:01:22.345 ****** 2025-10-02 16:55:53,966 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:53,975 p=33521 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-10-02 16:55:53,975 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:53 +0000 (0:00:00.029) 0:01:22.374 ****** 2025-10-02 16:55:54,000 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,011 p=33521 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-10-02 16:55:54,011 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.036) 0:01:22.411 ****** 2025-10-02 16:55:54,033 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,047 p=33521 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-10-02 16:55:54,047 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.035) 0:01:22.446 ****** 2025-10-02 16:55:54,071 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,083 p=33521 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-10-02 16:55:54,084 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.036) 0:01:22.483 ****** 2025-10-02 16:55:54,106 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,118 p=33521 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-10-02 16:55:54,118 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.034) 0:01:22.518 ****** 2025-10-02 16:55:54,144 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,156 p=33521 u=zuul n=ansible | TASK [openshift_setup : Metal3 tweaks _raw_params=metal3_config.yml] *********** 2025-10-02 16:55:54,156 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.037) 0:01:22.555 ****** 2025-10-02 16:55:54,183 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_setup/tasks/metal3_config.yml for localhost 2025-10-02 16:55:54,197 p=33521 u=zuul n=ansible | TASK [openshift_setup : Fetch Metal3 configuration name _raw_params=oc get Provisioning -o name] *** 2025-10-02 16:55:54,197 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.040) 0:01:22.596 ****** 2025-10-02 16:55:54,212 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,222 p=33521 u=zuul n=ansible | TASK [openshift_setup : Apply the patch to Metal3 Provisioning _raw_params=oc patch {{ _cifmw_openshift_setup_provisioning_name.stdout }} --type='json' -p='[{"op": "replace", "path": "/spec/watchAllNamespaces", "value": true}]'] *** 2025-10-02 16:55:54,223 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.025) 0:01:22.622 ****** 2025-10-02 16:55:54,237 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:54,246 p=33521 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-10-02 16:55:54,247 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:54 +0000 (0:00:00.024) 0:01:22.646 ****** 2025-10-02 16:55:55,209 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:55,221 p=33521 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-10-02 16:55:55,222 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:55 +0000 (0:00:00.974) 0:01:23.621 ****** 2025-10-02 16:55:56,210 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:56,220 p=33521 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-10-02 16:55:56,221 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:56 +0000 (0:00:00.999) 0:01:24.620 ****** 2025-10-02 16:55:56,948 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:56,963 p=33521 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-10-02 16:55:56,964 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:56 +0000 (0:00:00.742) 0:01:25.363 ****** 2025-10-02 16:55:56,982 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:56,998 p=33521 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-10-02 16:55:56,998 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:56 +0000 (0:00:00.034) 0:01:25.398 ****** 2025-10-02 16:55:57,018 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:57,099 p=33521 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-10-02 16:55:57,100 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:57 +0000 (0:00:00.101) 0:01:25.499 ****** 2025-10-02 16:55:57,121 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:57,136 p=33521 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-10-02 16:55:57,137 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:57 +0000 (0:00:00.037) 0:01:25.536 ****** 2025-10-02 16:55:57,159 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:55:57,169 p=33521 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-10-02 16:55:57,169 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:57 +0000 (0:00:00.032) 0:01:25.569 ****** 2025-10-02 16:55:57,275 p=33521 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 16:55:57,275 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:57 +0000 (0:00:00.105) 0:01:25.674 ****** 2025-10-02 16:55:57,498 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:57,521 p=33521 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-10-02 16:55:57,522 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:57 +0000 (0:00:00.246) 0:01:25.921 ****** 2025-10-02 16:55:58,317 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:58,328 p=33521 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-10-02 16:55:58,328 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:58 +0000 (0:00:00.806) 0:01:26.727 ****** 2025-10-02 16:55:58,356 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-10-02 16:55:58,372 p=33521 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-10-02 16:55:58,372 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:58 +0000 (0:00:00.043) 0:01:26.771 ****** 2025-10-02 16:55:58,950 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:55:58,960 p=33521 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-10-02 16:55:58,961 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:55:58 +0000 (0:00:00.588) 0:01:27.360 ****** 2025-10-02 16:56:01,659 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:01,695 p=33521 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-10-02 16:56:01,695 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:01 +0000 (0:00:02.734) 0:01:30.094 ****** 2025-10-02 16:56:01,712 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:01,727 p=33521 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-10-02 16:56:01,727 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:01 +0000 (0:00:00.032) 0:01:30.126 ****** 2025-10-02 16:56:02,462 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:02,470 p=33521 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-10-02 16:56:02,470 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:02 +0000 (0:00:00.743) 0:01:30.870 ****** 2025-10-02 16:56:03,225 p=33521 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-10-02 16:56:04,027 p=33521 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-10-02 16:56:04,757 p=33521 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-10-02 16:56:04,772 p=33521 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2025-10-02 16:56:04,772 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:04 +0000 (0:00:02.301) 0:01:33.172 ****** 2025-10-02 16:56:04,974 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:04,988 p=33521 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ lookup('env', 'HOME') }}/bin/cmctl, mode=0755] *** 2025-10-02 16:56:04,988 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:04 +0000 (0:00:00.216) 0:01:33.388 ****** 2025-10-02 16:56:05,507 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:05,517 p=33521 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ lookup('env', 'HOME') }}/bin/cmctl check api --wait=2m] *** 2025-10-02 16:56:05,517 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.528) 0:01:33.916 ****** 2025-10-02 16:56:05,845 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:05,862 p=33521 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-10-02 16:56:05,862 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.344) 0:01:34.261 ****** 2025-10-02 16:56:05,882 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:05,891 p=33521 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-10-02 16:56:05,891 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.029) 0:01:34.291 ****** 2025-10-02 16:56:05,911 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:05,922 p=33521 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-10-02 16:56:05,922 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.030) 0:01:34.321 ****** 2025-10-02 16:56:05,939 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:05,949 p=33521 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-10-02 16:56:05,950 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.027) 0:01:34.349 ****** 2025-10-02 16:56:05,968 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:05,986 p=33521 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-10-02 16:56:05,986 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:05 +0000 (0:00:00.036) 0:01:34.385 ****** 2025-10-02 16:56:06,010 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:06,022 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:06,022 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.035) 0:01:34.421 ****** 2025-10-02 16:56:06,085 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,096 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:06,096 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.073) 0:01:34.495 ****** 2025-10-02 16:56:06,175 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,188 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:06,188 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.092) 0:01:34.587 ****** 2025-10-02 16:56:06,295 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2025-10-02 16:56:06,309 p=33521 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-10-02 16:56:06,310 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.121) 0:01:34.709 ****** 2025-10-02 16:56:06,354 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,366 p=33521 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-10-02 16:56:06,366 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.056) 0:01:34.765 ****** 2025-10-02 16:56:06,583 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,596 p=33521 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-10-02 16:56:06,596 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.230) 0:01:34.995 ****** 2025-10-02 16:56:06,611 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:06,623 p=33521 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-10-02 16:56:06,623 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.026) 0:01:35.022 ****** 2025-10-02 16:56:06,806 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,817 p=33521 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-10-02 16:56:06,817 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.194) 0:01:35.216 ****** 2025-10-02 16:56:06,836 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:06,853 p=33521 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-10-02 16:56:06,853 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:06 +0000 (0:00:00.035) 0:01:35.252 ****** 2025-10-02 16:56:07,081 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:07,091 p=33521 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-10-02 16:56:07,092 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:07 +0000 (0:00:00.238) 0:01:35.491 ****** 2025-10-02 16:56:07,279 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:07,295 p=33521 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 16:56:07,295 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:07 +0000 (0:00:00.203) 0:01:35.694 ****** 2025-10-02 16:56:07,351 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_018_run_hook_without_retry_fetch.log 2025-10-02 16:56:16,925 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:16,935 p=33521 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2025-10-02 16:56:16,935 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:16 +0000 (0:00:09.639) 0:01:45.334 ****** 2025-10-02 16:56:16,955 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:16,966 p=33521 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:56:16,966 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:16 +0000 (0:00:00.030) 0:01:45.365 ****** 2025-10-02 16:56:17,163 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,175 p=33521 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-10-02 16:56:17,175 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.209) 0:01:45.574 ****** 2025-10-02 16:56:17,198 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,224 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:17,224 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.049) 0:01:45.623 ****** 2025-10-02 16:56:17,279 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,289 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:17,289 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.064) 0:01:45.688 ****** 2025-10-02 16:56:17,367 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,380 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:17,380 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.091) 0:01:45.779 ****** 2025-10-02 16:56:17,463 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:17,487 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:56:17,487 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.106) 0:01:45.886 ****** 2025-10-02 16:56:17,541 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,552 p=33521 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-10-02 16:56:17,553 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.065) 0:01:45.952 ****** 2025-10-02 16:56:17,577 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:17,590 p=33521 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-10-02 16:56:17,590 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.037) 0:01:45.989 ****** 2025-10-02 16:56:17,607 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:17,626 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:17,627 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.036) 0:01:46.026 ****** 2025-10-02 16:56:17,695 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,705 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:17,705 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.078) 0:01:46.104 ****** 2025-10-02 16:56:17,845 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:17,856 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:17,856 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:17 +0000 (0:00:00.150) 0:01:46.255 ****** 2025-10-02 16:56:17,991 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:18,059 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:18,059 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.203) 0:01:46.458 ****** 2025-10-02 16:56:18,122 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,132 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:18,132 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.072) 0:01:46.531 ****** 2025-10-02 16:56:18,216 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,227 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:18,227 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.095) 0:01:46.626 ****** 2025-10-02 16:56:18,316 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:18,334 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:56:18,334 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.107) 0:01:46.734 ****** 2025-10-02 16:56:18,382 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,393 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-10-02 16:56:18,393 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.058) 0:01:46.792 ****** 2025-10-02 16:56:18,409 p=33521 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-10-02 16:56:18,420 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:18,420 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.026) 0:01:46.819 ****** 2025-10-02 16:56:18,480 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,492 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:18,492 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.071) 0:01:46.891 ****** 2025-10-02 16:56:18,573 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,585 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:18,586 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.093) 0:01:46.985 ****** 2025-10-02 16:56:18,666 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:18,691 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:18,691 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.105) 0:01:47.090 ****** 2025-10-02 16:56:18,749 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,759 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:18,759 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.067) 0:01:47.158 ****** 2025-10-02 16:56:18,840 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:18,863 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:18,863 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.104) 0:01:47.262 ****** 2025-10-02 16:56:18,951 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:18,971 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:56:18,971 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:18 +0000 (0:00:00.107) 0:01:47.370 ****** 2025-10-02 16:56:19,018 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:19,028 p=33521 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-10-02 16:56:19,028 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.057) 0:01:47.427 ****** 2025-10-02 16:56:19,053 p=33521 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-10-02 16:56:19,059 p=33521 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-10-02 16:56:19,061 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,071 p=33521 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-10-02 16:56:19,071 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.043) 0:01:47.471 ****** 2025-10-02 16:56:19,096 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,107 p=33521 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-10-02 16:56:19,108 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.036) 0:01:47.507 ****** 2025-10-02 16:56:19,135 p=33521 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '1022', 'change_url': 'https://github.com/openstack-k8s-operators/nova-operator/pull/1022', 'commit_id': '4c3f36871c5668193821e587a18ec8001a428e96', 'patchset': '4c3f36871c5668193821e587a18ec8001a428e96', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/nova-operator', 'name': 'openstack-k8s-operators/nova-operator', 'short_name': 'nova-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/nova-operator'}, 'topic': None}) 2025-10-02 16:56:19,136 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,146 p=33521 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-10-02 16:56:19,146 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.038) 0:01:47.545 ****** 2025-10-02 16:56:19,168 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,178 p=33521 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-10-02 16:56:19,178 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.032) 0:01:47.577 ****** 2025-10-02 16:56:19,201 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,211 p=33521 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-10-02 16:56:19,211 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.033) 0:01:47.610 ****** 2025-10-02 16:56:19,238 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,249 p=33521 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-10-02 16:56:19,249 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.037) 0:01:47.648 ****** 2025-10-02 16:56:19,272 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,285 p=33521 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-10-02 16:56:19,285 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.036) 0:01:47.684 ****** 2025-10-02 16:56:19,309 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,320 p=33521 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-10-02 16:56:19,320 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.035) 0:01:47.719 ****** 2025-10-02 16:56:19,343 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,352 p=33521 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:56:19,352 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.032) 0:01:47.752 ****** 2025-10-02 16:56:19,377 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,397 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:19,397 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.044) 0:01:47.796 ****** 2025-10-02 16:56:19,456 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:19,469 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:19,469 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.072) 0:01:47.869 ****** 2025-10-02 16:56:19,559 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:19,569 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:19,569 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.099) 0:01:47.968 ****** 2025-10-02 16:56:19,707 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:19,730 p=33521 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-10-02 16:56:19,730 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.161) 0:01:48.130 ****** 2025-10-02 16:56:19,842 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:19,892 p=33521 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-10-02 16:56:19,892 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.162) 0:01:48.292 ****** 2025-10-02 16:56:19,980 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:19,994 p=33521 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-10-02 16:56:19,994 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:19 +0000 (0:00:00.101) 0:01:48.394 ****** 2025-10-02 16:56:20,081 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:20,101 p=33521 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-10-02 16:56:20,101 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:20 +0000 (0:00:00.107) 0:01:48.501 ****** 2025-10-02 16:56:20,155 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:20,165 p=33521 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-10-02 16:56:20,165 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:20 +0000 (0:00:00.064) 0:01:48.565 ****** 2025-10-02 16:56:20,274 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-10-02 16:56:20,274 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:20 +0000 (0:00:00.108) 0:01:48.674 ****** 2025-10-02 16:56:20,483 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:20,493 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-10-02 16:56:20,493 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:20 +0000 (0:00:00.218) 0:01:48.892 ****** 2025-10-02 16:56:21,222 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:21,231 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-10-02 16:56:21,232 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:21 +0000 (0:00:00.738) 0:01:49.631 ****** 2025-10-02 16:56:21,671 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:21,682 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-10-02 16:56:21,682 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:21 +0000 (0:00:00.450) 0:01:50.081 ****** 2025-10-02 16:56:22,410 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:22,426 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-10-02 16:56:22,427 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:22 +0000 (0:00:00.744) 0:01:50.826 ****** 2025-10-02 16:56:22,679 p=33521 u=zuul n=ansible | changed: [localhost -> compute-0(38.102.83.180)] => (item=compute-0) 2025-10-02 16:56:22,913 p=33521 u=zuul n=ansible | changed: [localhost -> compute-1(38.102.83.220)] => (item=compute-1) 2025-10-02 16:56:23,138 p=33521 u=zuul n=ansible | changed: [localhost -> compute-2(38.102.83.166)] => (item=compute-2) 2025-10-02 16:56:23,977 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=crc) 2025-10-02 16:56:24,315 p=33521 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.201)] => (item=controller) 2025-10-02 16:56:24,484 p=33521 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-10-02 16:56:24,487 p=33521 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-10-02 16:56:24,501 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-10-02 16:56:24,501 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:24 +0000 (0:00:02.074) 0:01:52.900 ****** 2025-10-02 16:56:24,538 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:24,551 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-10-02 16:56:24,551 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:24 +0000 (0:00:00.049) 0:01:52.950 ****** 2025-10-02 16:56:25,286 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:25,296 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-10-02 16:56:25,296 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:25 +0000 (0:00:00.745) 0:01:53.696 ****** 2025-10-02 16:56:25,330 p=33521 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-10-02 16:56:25,343 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-10-02 16:56:25,343 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:25 +0000 (0:00:00.046) 0:01:53.742 ****** 2025-10-02 16:56:25,822 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=1) 2025-10-02 16:56:26,267 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=2) 2025-10-02 16:56:26,734 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=3) 2025-10-02 16:56:27,293 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=4) 2025-10-02 16:56:27,751 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=5) 2025-10-02 16:56:28,296 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=6) 2025-10-02 16:56:28,826 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=7) 2025-10-02 16:56:29,349 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=8) 2025-10-02 16:56:29,827 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=9) 2025-10-02 16:56:30,305 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=10) 2025-10-02 16:56:30,778 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=11) 2025-10-02 16:56:31,243 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=12) 2025-10-02 16:56:31,761 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=13) 2025-10-02 16:56:32,237 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=14) 2025-10-02 16:56:32,720 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=15) 2025-10-02 16:56:33,203 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=16) 2025-10-02 16:56:33,715 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=17) 2025-10-02 16:56:34,141 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=18) 2025-10-02 16:56:34,712 p=33521 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.241)] => (item=19) 2025-10-02 16:56:35,178 p=33521 u=zuul n=ansible | ok: [localhost -> crc(38.102.83.241)] => (item=20) 2025-10-02 16:56:35,198 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-10-02 16:56:35,198 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:35 +0000 (0:00:09.855) 0:02:03.598 ****** 2025-10-02 16:56:35,620 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:35,631 p=33521 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-10-02 16:56:35,631 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:35 +0000 (0:00:00.432) 0:02:04.031 ****** 2025-10-02 16:56:36,642 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:36,663 p=33521 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-10-02 16:56:36,664 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:01.032) 0:02:05.063 ****** 2025-10-02 16:56:36,687 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:36,698 p=33521 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-10-02 16:56:36,698 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.034) 0:02:05.097 ****** 2025-10-02 16:56:36,838 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-10-02 16:56:36,838 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.140) 0:02:05.237 ****** 2025-10-02 16:56:36,863 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:36,874 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-10-02 16:56:36,874 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.035) 0:02:05.273 ****** 2025-10-02 16:56:36,905 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:36,916 p=33521 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-10-02 16:56:36,916 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.041) 0:02:05.315 ****** 2025-10-02 16:56:36,937 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:36,947 p=33521 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-10-02 16:56:36,948 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.031) 0:02:05.347 ****** 2025-10-02 16:56:36,999 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-10-02 16:56:36,999 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:36 +0000 (0:00:00.051) 0:02:05.398 ****** 2025-10-02 16:56:37,025 p=33521 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:56:37,035 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-10-02 16:56:37,035 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:37 +0000 (0:00:00.036) 0:02:05.435 ****** 2025-10-02 16:56:37,056 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:37,067 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-10-02 16:56:37,067 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:37 +0000 (0:00:00.032) 0:02:05.467 ****** 2025-10-02 16:56:37,116 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_019_run.log 2025-10-02 16:56:38,614 p=33521 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-10-02 16:56:38,616 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:38,634 p=33521 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-10-02 16:56:38,634 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:38 +0000 (0:00:01.566) 0:02:07.033 ****** 2025-10-02 16:56:38,692 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-10-02 16:56:38,692 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:38 +0000 (0:00:00.057) 0:02:07.091 ****** 2025-10-02 16:56:38,723 p=33521 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_IMG: 38.102.83.74:5001/openstack-k8s-operators/openstack-operator-index:c285f7662d2d520fb14d6b960fdf00d88db14929 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:56:38,733 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-10-02 16:56:38,733 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:38 +0000 (0:00:00.041) 0:02:07.133 ****** 2025-10-02 16:56:38,755 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:38,765 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-10-02 16:56:38,765 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:38 +0000 (0:00:00.031) 0:02:07.164 ****** 2025-10-02 16:56:38,819 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_020_run.log 2025-10-02 16:56:51,554 p=33521 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-10-02 16:56:51,557 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:51,574 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-10-02 16:56:51,574 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:51 +0000 (0:00:12.808) 0:02:19.973 ****** 2025-10-02 16:56:51,908 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:51,919 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-10-02 16:56:51,919 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:51 +0000 (0:00:00.344) 0:02:20.318 ****** 2025-10-02 16:56:52,371 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:52,381 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-10-02 16:56:52,381 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:52 +0000 (0:00:00.462) 0:02:20.781 ****** 2025-10-02 16:56:53,333 p=33521 u=zuul n=ansible | ok: [localhost] 2025-10-02 16:56:53,344 p=33521 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-10-02 16:56:53,344 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:53 +0000 (0:00:00.963) 0:02:21.744 ****** 2025-10-02 16:56:53,410 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-10-02 16:56:53,411 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:53 +0000 (0:00:00.066) 0:02:21.810 ****** 2025-10-02 16:56:53,441 p=33521 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:56:53,453 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-10-02 16:56:53,453 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:53 +0000 (0:00:00.042) 0:02:21.853 ****** 2025-10-02 16:56:53,475 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:53,486 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-10-02 16:56:53,487 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:53 +0000 (0:00:00.033) 0:02:21.886 ****** 2025-10-02 16:56:53,552 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_021_run_openstack.log 2025-10-02 16:56:56,019 p=33521 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-10-02 16:56:56,021 p=33521 u=zuul n=ansible | changed: [localhost] 2025-10-02 16:56:56,036 p=33521 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-10-02 16:56:56,037 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:02.549) 0:02:24.436 ****** 2025-10-02 16:56:56,057 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:56,067 p=33521 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-10-02 16:56:56,067 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:00.030) 0:02:24.467 ****** 2025-10-02 16:56:56,092 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:56,106 p=33521 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-10-02 16:56:56,106 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:00.038) 0:02:24.505 ****** 2025-10-02 16:56:56,164 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-10-02 16:56:56,164 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:00.058) 0:02:24.564 ****** 2025-10-02 16:56:56,192 p=33521 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 NOVA_BRANCH: '' NOVA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/nova-operator OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-10-02 16:56:56,203 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-10-02 16:56:56,203 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:00.038) 0:02:24.602 ****** 2025-10-02 16:56:56,223 p=33521 u=zuul n=ansible | skipping: [localhost] 2025-10-02 16:56:56,233 p=33521 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-10-02 16:56:56,233 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:56 +0000 (0:00:00.030) 0:02:24.632 ****** 2025-10-02 16:56:56,285 p=33521 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_022_run_openstack_deploy.log 2025-10-02 16:56:57,813 p=33521 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-10-02 16:56:57,814 p=33521 u=zuul n=ansible | An exception occurred during task execution. To see the full traceback, use -vvv. The error was: NoneType: None 2025-10-02 16:56:57,815 p=33521 u=zuul n=ansible | fatal: [localhost]: FAILED! => attempts: 1 changed: true msg: non-zero return code rc: 2 stderr: '' stderr_lines: [] stdout: | ~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml namespace/openstack unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" NAME DISPLAY NAME STATUS openstack Active oc project openstack Now using project "openstack" on server "https://api.crc.testing:6443". oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr | oc delete --ignore-not-found=true -f - Error from server (BadRequest): error when deleting "STDIN": admission webhook "vnetconfig.kb.io" denied the request: unable to delete NetConfig while there are still 3 IPSets in the namespace make: *** [Makefile:1163: netconfig_deploy_cleanup] Error 1 stdout_lines: - ~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts - bash scripts/gen-namespace.sh - + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' - + '[' -z openstack ']' - + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack - + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' - + cat - oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml - namespace/openstack unchanged - timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" - NAME DISPLAY NAME STATUS - openstack Active - oc project openstack - Now using project "openstack" on server "https://api.crc.testing:6443". - oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr | oc delete --ignore-not-found=true -f - - 'Error from server (BadRequest): error when deleting "STDIN": admission webhook "vnetconfig.kb.io" denied the request: unable to delete NetConfig while there are still 3 IPSets in the namespace' - 'make: *** [Makefile:1163: netconfig_deploy_cleanup] Error 1' 2025-10-02 16:56:57,815 p=33521 u=zuul n=ansible | NO MORE HOSTS LEFT ************************************************************* 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | localhost : ok=151 changed=29 unreachable=0 failed=1 skipped=103 rescued=0 ignored=1 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | Thursday 02 October 2025 16:56:57 +0000 (0:00:01.584) 0:02:26.217 ****** 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | =============================================================================== 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 27.05s 2025-10-02 16:56:57,818 p=33521 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 26.05s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | install_yamls_makes : Run openstack ------------------------------------ 12.81s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 9.86s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters --- 9.64s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 2.73s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | install_yamls_makes : Run openstack_init -------------------------------- 2.55s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------- 2.30s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | ci_local_storage : Fetch hostnames for all hosts ------------------------ 2.07s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | openshift_setup : Create required namespaces ---------------------------- 1.85s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 1.71s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | install_ca : Update ca bundle ------------------------------------------- 1.63s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | install_yamls_makes : Run openstack_deploy_prep ------------------------- 1.58s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | install_yamls_makes : Run input ----------------------------------------- 1.57s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | repo_setup : Make sure git-core package is installed -------------------- 1.39s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | repo_setup : Remove existing repos from /etc/yum.repos.d directory ------ 1.25s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | ci_setup : Manage directories ------------------------------------------- 1.14s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | openshift_login : Fetch OpenShift token --------------------------------- 1.08s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | ci_local_storage : Apply pv related storage manifest file --------------- 1.03s 2025-10-02 16:56:57,819 p=33521 u=zuul n=ansible | openshift_setup : Patch network operator -------------------------------- 1.00s