2025-12-02 20:25:41,164 p=11841 u=zuul n=ansible | Starting galaxy collection install process 2025-12-02 20:25:41,165 p=11841 u=zuul n=ansible | Process install dependency map 2025-12-02 20:25:55,315 p=11841 u=zuul n=ansible | Starting collection install process 2025-12-02 20:25:55,315 p=11841 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+b6f53270' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-12-02 20:25:55,808 p=11841 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+b6f53270 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-12-02 20:25:55,808 p=11841 u=zuul n=ansible | cifmw.general:1.0.0+b6f53270 was installed successfully 2025-12-02 20:25:55,808 p=11841 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-12-02 20:25:55,870 p=11841 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-12-02 20:25:55,871 p=11841 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-12-02 20:25:55,871 p=11841 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-12-02 20:25:56,642 p=11841 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-12-02 20:25:56,642 p=11841 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-12-02 20:25:56,642 p=11841 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-12-02 20:25:56,692 p=11841 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-12-02 20:25:56,692 p=11841 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-12-02 20:25:56,692 p=11841 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-12-02 20:25:56,789 p=11841 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-12-02 20:25:56,789 p=11841 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-12-02 20:25:56,789 p=11841 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-12-02 20:25:56,813 p=11841 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-12-02 20:25:56,813 p=11841 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-12-02 20:25:56,813 p=11841 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-12-02 20:25:56,958 p=11841 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-12-02 20:25:56,958 p=11841 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-12-02 20:25:56,958 p=11841 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-12-02 20:25:57,091 p=11841 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-12-02 20:25:57,091 p=11841 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-12-02 20:25:57,091 p=11841 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-12-02 20:25:57,172 p=11841 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-12-02 20:25:57,172 p=11841 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-12-02 20:25:57,173 p=11841 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-12-02 20:25:57,191 p=11841 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-12-02 20:25:57,191 p=11841 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-12-02 20:25:57,191 p=11841 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-12-02 20:25:57,458 p=11841 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-12-02 20:25:57,458 p=11841 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-12-02 20:25:57,458 p=11841 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-12-02 20:25:57,732 p=11841 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-12-02 20:25:57,732 p=11841 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-12-02 20:25:57,732 p=11841 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-12-02 20:25:57,764 p=11841 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-12-02 20:25:57,764 p=11841 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-12-02 20:25:57,764 p=11841 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-12-02 20:25:57,793 p=11841 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-12-02 20:25:57,793 p=11841 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-12-02 20:25:57,793 p=11841 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-12-02 20:25:57,881 p=11841 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-12-02 20:25:57,881 p=11841 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-12-02 20:26:12,436 p=13428 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-12-02 20:26:12,454 p=13428 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-12-02 20:26:12,454 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:12 +0000 (0:00:00.033) 0:00:00.033 ****** 2025-12-02 20:26:12,454 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:12 +0000 (0:00:00.032) 0:00:00.032 ****** 2025-12-02 20:26:13,657 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:13,696 p=13428 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-12-02 20:26:13,696 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:13 +0000 (0:00:01.242) 0:00:01.276 ****** 2025-12-02 20:26:13,696 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:13 +0000 (0:00:01.242) 0:00:01.274 ****** 2025-12-02 20:26:14,016 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:14,029 p=13428 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-12-02 20:26:14,030 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.333) 0:00:01.609 ****** 2025-12-02 20:26:14,030 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.333) 0:00:01.608 ****** 2025-12-02 20:26:14,065 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-12-02 20:26:14,148 p=13428 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-12-02 20:26:14,148 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.118) 0:00:01.727 ****** 2025-12-02 20:26:14,148 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.118) 0:00:01.726 ****** 2025-12-02 20:26:14,170 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:14,177 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-02 20:26:14,177 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.029) 0:00:01.756 ****** 2025-12-02 20:26:14,177 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.029) 0:00:01.755 ****** 2025-12-02 20:26:14,206 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:14,212 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-12-02 20:26:14,212 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.034) 0:00:01.791 ****** 2025-12-02 20:26:14,212 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.034) 0:00:01.790 ****** 2025-12-02 20:26:14,300 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:14,306 p=13428 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-12-02 20:26:14,306 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.094) 0:00:01.885 ****** 2025-12-02 20:26:14,306 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.094) 0:00:01.884 ****** 2025-12-02 20:26:14,548 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:14,555 p=13428 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-12-02 20:26:14,555 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.248) 0:00:02.134 ****** 2025-12-02 20:26:14,555 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.248) 0:00:02.133 ****** 2025-12-02 20:26:14,585 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:14,596 p=13428 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-12-02 20:26:14,596 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.041) 0:00:02.176 ****** 2025-12-02 20:26:14,596 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.041) 0:00:02.174 ****** 2025-12-02 20:26:14,618 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:14,628 p=13428 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-12-02 20:26:14,628 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.032) 0:00:02.208 ****** 2025-12-02 20:26:14,629 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.032) 0:00:02.206 ****** 2025-12-02 20:26:14,655 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:14,671 p=13428 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-12-02 20:26:14,671 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.042) 0:00:02.251 ****** 2025-12-02 20:26:14,671 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:14 +0000 (0:00:00.042) 0:00:02.249 ****** 2025-12-02 20:26:16,338 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:16,363 p=13428 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-02 20:26:16,363 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:16 +0000 (0:00:01.691) 0:00:03.942 ****** 2025-12-02 20:26:16,363 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:16 +0000 (0:00:01.691) 0:00:03.941 ****** 2025-12-02 20:26:16,608 p=13428 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-12-02 20:26:16,819 p=13428 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-12-02 20:26:16,992 p=13428 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-12-02 20:26:17,001 p=13428 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-12-02 20:26:17,001 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:17 +0000 (0:00:00.637) 0:00:04.580 ****** 2025-12-02 20:26:17,001 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:17 +0000 (0:00:00.637) 0:00:04.579 ****** 2025-12-02 20:26:18,076 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:18,086 p=13428 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-12-02 20:26:18,086 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:18 +0000 (0:00:01.085) 0:00:05.665 ****** 2025-12-02 20:26:18,086 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:18 +0000 (0:00:01.085) 0:00:05.664 ****** 2025-12-02 20:26:19,074 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:19,088 p=13428 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-12-02 20:26:19,089 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:19 +0000 (0:00:01.002) 0:00:06.668 ****** 2025-12-02 20:26:19,089 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:19 +0000 (0:00:01.002) 0:00:06.667 ****** 2025-12-02 20:26:27,521 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:27,529 p=13428 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-12-02 20:26:27,529 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:27 +0000 (0:00:08.440) 0:00:15.109 ****** 2025-12-02 20:26:27,529 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:27 +0000 (0:00:08.440) 0:00:15.107 ****** 2025-12-02 20:26:28,400 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:28,412 p=13428 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-12-02 20:26:28,412 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:28 +0000 (0:00:00.882) 0:00:15.992 ****** 2025-12-02 20:26:28,412 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:28 +0000 (0:00:00.882) 0:00:15.990 ****** 2025-12-02 20:26:28,438 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:28,450 p=13428 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-12-02 20:26:28,450 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:28 +0000 (0:00:00.037) 0:00:16.030 ****** 2025-12-02 20:26:28,450 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:28 +0000 (0:00:00.037) 0:00:16.028 ****** 2025-12-02 20:26:29,140 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:29,156 p=13428 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-12-02 20:26:29,156 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.705) 0:00:16.735 ****** 2025-12-02 20:26:29,156 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.705) 0:00:16.734 ****** 2025-12-02 20:26:29,195 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:29,209 p=13428 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-12-02 20:26:29,209 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.053) 0:00:16.789 ****** 2025-12-02 20:26:29,210 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.053) 0:00:16.788 ****** 2025-12-02 20:26:29,271 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:29,280 p=13428 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-12-02 20:26:29,280 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.071) 0:00:16.860 ****** 2025-12-02 20:26:29,281 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.070) 0:00:16.859 ****** 2025-12-02 20:26:29,344 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:29,355 p=13428 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-12-02 20:26:29,355 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.074) 0:00:16.934 ****** 2025-12-02 20:26:29,355 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.074) 0:00:16.933 ****** 2025-12-02 20:26:29,858 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:29,870 p=13428 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-12-02 20:26:29,871 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.515) 0:00:17.450 ****** 2025-12-02 20:26:29,871 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:29 +0000 (0:00:00.515) 0:00:17.449 ****** 2025-12-02 20:26:30,699 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:30,709 p=13428 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-12-02 20:26:30,709 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.838) 0:00:18.289 ****** 2025-12-02 20:26:30,709 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.838) 0:00:18.287 ****** 2025-12-02 20:26:30,737 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,747 p=13428 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-12-02 20:26:30,747 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.037) 0:00:18.327 ****** 2025-12-02 20:26:30,747 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.038) 0:00:18.325 ****** 2025-12-02 20:26:30,776 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,786 p=13428 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-12-02 20:26:30,786 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.038) 0:00:18.366 ****** 2025-12-02 20:26:30,786 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.038) 0:00:18.364 ****** 2025-12-02 20:26:30,814 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,824 p=13428 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-12-02 20:26:30,824 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.037) 0:00:18.403 ****** 2025-12-02 20:26:30,824 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.037) 0:00:18.402 ****** 2025-12-02 20:26:30,876 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:30,895 p=13428 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-12-02 20:26:30,895 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.071) 0:00:18.475 ****** 2025-12-02 20:26:30,896 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.071) 0:00:18.474 ****** 2025-12-02 20:26:30,913 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,929 p=13428 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-12-02 20:26:30,929 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.033) 0:00:18.509 ****** 2025-12-02 20:26:30,929 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.033) 0:00:18.507 ****** 2025-12-02 20:26:30,947 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,957 p=13428 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-12-02 20:26:30,957 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.027) 0:00:18.536 ****** 2025-12-02 20:26:30,957 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.027) 0:00:18.535 ****** 2025-12-02 20:26:30,973 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:30,984 p=13428 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-12-02 20:26:30,985 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.027) 0:00:18.564 ****** 2025-12-02 20:26:30,985 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:30 +0000 (0:00:00.027) 0:00:18.563 ****** 2025-12-02 20:26:31,004 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:31,012 p=13428 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-12-02 20:26:31,012 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.027) 0:00:18.591 ****** 2025-12-02 20:26:31,012 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.027) 0:00:18.590 ****** 2025-12-02 20:26:31,031 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:31,044 p=13428 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-12-02 20:26:31,044 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.032) 0:00:18.624 ****** 2025-12-02 20:26:31,045 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.032) 0:00:18.623 ****** 2025-12-02 20:26:31,061 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:31,071 p=13428 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-12-02 20:26:31,071 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.026) 0:00:18.651 ****** 2025-12-02 20:26:31,071 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.026) 0:00:18.649 ****** 2025-12-02 20:26:31,085 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:31,092 p=13428 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-12-02 20:26:31,092 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.020) 0:00:18.671 ****** 2025-12-02 20:26:31,092 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.020) 0:00:18.670 ****** 2025-12-02 20:26:31,295 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:31,303 p=13428 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-12-02 20:26:31,303 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.210) 0:00:18.882 ****** 2025-12-02 20:26:31,303 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.210) 0:00:18.881 ****** 2025-12-02 20:26:31,545 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:31,553 p=13428 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-12-02 20:26:31,554 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.250) 0:00:19.133 ****** 2025-12-02 20:26:31,554 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.250) 0:00:19.132 ****** 2025-12-02 20:26:31,836 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:31,846 p=13428 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-12-02 20:26:31,846 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.292) 0:00:19.425 ****** 2025-12-02 20:26:31,846 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:31 +0000 (0:00:00.292) 0:00:19.424 ****** 2025-12-02 20:26:32,484 p=13428 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.20:8766/gating.repo 2025-12-02 20:26:32,485 p=13428 u=zuul n=ansible | ...ignoring 2025-12-02 20:26:32,495 p=13428 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-12-02 20:26:32,495 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.648) 0:00:20.074 ****** 2025-12-02 20:26:32,495 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.648) 0:00:20.073 ****** 2025-12-02 20:26:32,551 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:32,560 p=13428 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-12-02 20:26:32,560 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.065) 0:00:20.140 ****** 2025-12-02 20:26:32,561 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.065) 0:00:20.139 ****** 2025-12-02 20:26:32,600 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:32,614 p=13428 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-12-02 20:26:32,614 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.053) 0:00:20.193 ****** 2025-12-02 20:26:32,614 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.053) 0:00:20.192 ****** 2025-12-02 20:26:32,650 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:32,658 p=13428 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-12-02 20:26:32,658 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.044) 0:00:20.237 ****** 2025-12-02 20:26:32,658 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.044) 0:00:20.236 ****** 2025-12-02 20:26:32,686 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:32,693 p=13428 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-12-02 20:26:32,693 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.035) 0:00:20.272 ****** 2025-12-02 20:26:32,693 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.035) 0:00:20.271 ****** 2025-12-02 20:26:32,752 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:26:32,761 p=13428 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-12-02 20:26:32,761 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.067) 0:00:20.340 ****** 2025-12-02 20:26:32,761 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:32 +0000 (0:00:00.067) 0:00:20.339 ****** 2025-12-02 20:26:33,109 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:26:33,121 p=13428 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-12-02 20:26:33,121 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:33 +0000 (0:00:00.359) 0:00:20.700 ****** 2025-12-02 20:26:33,121 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:33 +0000 (0:00:00.359) 0:00:20.699 ****** 2025-12-02 20:26:33,376 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-12-02 20:26:33,593 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-12-02 20:26:33,807 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/kubernetes.repo) 2025-12-02 20:26:33,817 p=13428 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-12-02 20:26:33,817 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:33 +0000 (0:00:00.696) 0:00:21.396 ****** 2025-12-02 20:26:33,817 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:33 +0000 (0:00:00.695) 0:00:21.395 ****** 2025-12-02 20:26:34,308 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:34,324 p=13428 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-12-02 20:26:34,325 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.507) 0:00:21.904 ****** 2025-12-02 20:26:34,325 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.507) 0:00:21.903 ****** 2025-12-02 20:26:34,655 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:26:34,668 p=13428 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-12-02 20:26:34,668 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.343) 0:00:22.247 ****** 2025-12-02 20:26:34,668 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.342) 0:00:22.246 ****** 2025-12-02 20:26:34,713 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-12-02 20:26:34,722 p=13428 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-12-02 20:26:34,722 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.054) 0:00:22.301 ****** 2025-12-02 20:26:34,722 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.054) 0:00:22.300 ****** 2025-12-02 20:26:34,754 p=13428 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-12-02 20:26:34,762 p=13428 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-12-02 20:26:34,763 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.040) 0:00:22.342 ****** 2025-12-02 20:26:34,763 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:26:34 +0000 (0:00:00.040) 0:00:22.341 ****** 2025-12-02 20:27:03,228 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:03,234 p=13428 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-12-02 20:27:03,234 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:28.471) 0:00:50.814 ****** 2025-12-02 20:27:03,235 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:28.471) 0:00:50.813 ****** 2025-12-02 20:27:03,598 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:03,608 p=13428 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-12-02 20:27:03,608 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:00.373) 0:00:51.188 ****** 2025-12-02 20:27:03,608 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:00.373) 0:00:51.186 ****** 2025-12-02 20:27:03,832 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:03,842 p=13428 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-12-02 20:27:03,842 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:00.233) 0:00:51.422 ****** 2025-12-02 20:27:03,842 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:03 +0000 (0:00:00.233) 0:00:51.420 ****** 2025-12-02 20:27:09,323 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:09,337 p=13428 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-12-02 20:27:09,337 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:05.494) 0:00:56.916 ****** 2025-12-02 20:27:09,337 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:05.494) 0:00:56.915 ****** 2025-12-02 20:27:09,383 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:09,393 p=13428 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-12-02 20:27:09,393 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:00.055) 0:00:56.972 ****** 2025-12-02 20:27:09,393 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:00.055) 0:00:56.971 ****** 2025-12-02 20:27:09,789 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:09,803 p=13428 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-12-02 20:27:09,803 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:00.410) 0:00:57.383 ****** 2025-12-02 20:27:09,804 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:09 +0000 (0:00:00.410) 0:00:57.381 ****** 2025-12-02 20:27:10,100 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:10,115 p=13428 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-12-02 20:27:10,115 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.311) 0:00:57.694 ****** 2025-12-02 20:27:10,115 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.311) 0:00:57.693 ****** 2025-12-02 20:27:10,133 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,142 p=13428 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-12-02 20:27:10,142 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.026) 0:00:57.721 ****** 2025-12-02 20:27:10,142 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.026) 0:00:57.720 ****** 2025-12-02 20:27:10,169 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,176 p=13428 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-12-02 20:27:10,176 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.034) 0:00:57.755 ****** 2025-12-02 20:27:10,176 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.034) 0:00:57.754 ****** 2025-12-02 20:27:10,199 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,206 p=13428 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-12-02 20:27:10,206 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.030) 0:00:57.785 ****** 2025-12-02 20:27:10,206 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.030) 0:00:57.784 ****** 2025-12-02 20:27:10,229 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,240 p=13428 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-12-02 20:27:10,240 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.034) 0:00:57.820 ****** 2025-12-02 20:27:10,240 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.034) 0:00:57.818 ****** 2025-12-02 20:27:10,260 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,271 p=13428 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-12-02 20:27:10,271 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.030) 0:00:57.851 ****** 2025-12-02 20:27:10,271 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.030) 0:00:57.849 ****** 2025-12-02 20:27:10,300 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:10,308 p=13428 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-12-02 20:27:10,309 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.037) 0:00:57.888 ****** 2025-12-02 20:27:10,309 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:10 +0000 (0:00:00.037) 0:00:57.887 ****** 2025-12-02 20:27:10,627 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-12-02 20:27:10,879 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-12-02 20:27:11,103 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-12-02 20:27:11,352 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-12-02 20:27:11,585 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-12-02 20:27:11,603 p=13428 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-12-02 20:27:11,603 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:11 +0000 (0:00:01.294) 0:00:59.182 ****** 2025-12-02 20:27:11,603 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:11 +0000 (0:00:01.294) 0:00:59.181 ****** 2025-12-02 20:27:11,771 p=13428 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-12-02 20:27:11,771 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:11 +0000 (0:00:00.167) 0:00:59.350 ****** 2025-12-02 20:27:11,771 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:11 +0000 (0:00:00.167) 0:00:59.349 ****** 2025-12-02 20:27:12,005 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-12-02 20:27:12,171 p=13428 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-12-02 20:27:12,349 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-12-02 20:27:12,371 p=13428 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-12-02 20:27:12,371 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.599) 0:00:59.950 ****** 2025-12-02 20:27:12,371 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.599) 0:00:59.949 ****** 2025-12-02 20:27:12,442 p=13428 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-12-02 20:27:12,442 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.071) 0:01:00.022 ****** 2025-12-02 20:27:12,442 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.071) 0:01:00.020 ****** 2025-12-02 20:27:12,507 p=13428 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '503', 'change_url': 'https://github.com/openstack-k8s-operators/infra-operator/pull/503', 'commit_id': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'patchset': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'name': 'openstack-k8s-operators/infra-operator', 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'topic': None}) 2025-12-02 20:27:12,524 p=13428 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-12-02 20:27:12,524 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.082) 0:01:00.104 ****** 2025-12-02 20:27:12,525 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.082) 0:01:00.103 ****** 2025-12-02 20:27:12,591 p=13428 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '503', 'change_url': 'https://github.com/openstack-k8s-operators/infra-operator/pull/503', 'commit_id': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'patchset': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'name': 'openstack-k8s-operators/infra-operator', 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'topic': None}) => msg: | _repo_operator_name: infra _repo_operator_info: [{'key': 'INFRA_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/infra-operator'}, {'key': 'INFRA_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'INFRA_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/infra-operator', 'INFRA_BRANCH': ''} 2025-12-02 20:27:12,612 p=13428 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2025-12-02 20:27:12,612 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.087) 0:01:00.191 ****** 2025-12-02 20:27:12,612 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.087) 0:01:00.190 ****** 2025-12-02 20:27:12,664 p=13428 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2025-12-02 20:27:12,664 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.052) 0:01:00.244 ****** 2025-12-02 20:27:12,664 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.052) 0:01:00.242 ****** 2025-12-02 20:27:12,711 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:12,725 p=13428 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2025-12-02 20:27:12,726 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.061) 0:01:00.305 ****** 2025-12-02 20:27:12,726 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.061) 0:01:00.304 ****** 2025-12-02 20:27:12,765 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:12,781 p=13428 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2025-12-02 20:27:12,781 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.055) 0:01:00.360 ****** 2025-12-02 20:27:12,781 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.055) 0:01:00.359 ****** 2025-12-02 20:27:12,811 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:12,825 p=13428 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2025-12-02 20:27:12,825 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.044) 0:01:00.405 ****** 2025-12-02 20:27:12,825 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.044) 0:01:00.403 ****** 2025-12-02 20:27:12,855 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:12,874 p=13428 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-12-02 20:27:12,874 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.048) 0:01:00.453 ****** 2025-12-02 20:27:12,874 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.048) 0:01:00.452 ****** 2025-12-02 20:27:12,976 p=13428 u=zuul n=ansible | ok: [localhost] => (item={'DEPLOY_DIR': '/home/zuul/ci-framework-data/artifacts/edpm_compute', 'BMAAS_INSTANCE_MEMORY': 8192, 'BMAAS_INSTANCE_VCPUS': 6, 'BMAAS_INSTANCE_DISK_SIZE': 40, 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=8GB', 'INSTALL_CERT_MANAGER': False}) 2025-12-02 20:27:12,988 p=13428 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-12-02 20:27:12,988 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.114) 0:01:00.567 ****** 2025-12-02 20:27:12,988 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:12 +0000 (0:00:00.114) 0:01:00.566 ****** 2025-12-02 20:27:13,061 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:13,076 p=13428 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-12-02 20:27:13,076 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:13 +0000 (0:00:00.088) 0:01:00.656 ****** 2025-12-02 20:27:13,076 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:13 +0000 (0:00:00.088) 0:01:00.654 ****** 2025-12-02 20:27:13,931 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:13,939 p=13428 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-12-02 20:27:13,940 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:13 +0000 (0:00:00.863) 0:01:01.519 ****** 2025-12-02 20:27:13,940 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:13 +0000 (0:00:00.863) 0:01:01.518 ****** 2025-12-02 20:27:14,214 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:14,231 p=13428 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-12-02 20:27:14,231 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.291) 0:01:01.810 ****** 2025-12-02 20:27:14,231 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.291) 0:01:01.809 ****** 2025-12-02 20:27:14,302 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:14,332 p=13428 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-12-02 20:27:14,333 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.101) 0:01:01.912 ****** 2025-12-02 20:27:14,333 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.101) 0:01:01.911 ****** 2025-12-02 20:27:14,888 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:14,895 p=13428 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-12-02 20:27:14,895 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.562) 0:01:02.474 ****** 2025-12-02 20:27:14,895 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.562) 0:01:02.473 ****** 2025-12-02 20:27:14,937 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:14,944 p=13428 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-12-02 20:27:14,944 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.049) 0:01:02.524 ****** 2025-12-02 20:27:14,944 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.049) 0:01:02.522 ****** 2025-12-02 20:27:14,977 p=13428 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2025-12-02 20:27:14,993 p=13428 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-12-02 20:27:14,993 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.048) 0:01:02.573 ****** 2025-12-02 20:27:14,993 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:14 +0000 (0:00:00.048) 0:01:02.571 ****** 2025-12-02 20:27:15,035 p=13428 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: 6 BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: '' BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: '' INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_PWD:' 2025-12-02 20:27:15,047 p=13428 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-12-02 20:27:15,047 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.053) 0:01:02.626 ****** 2025-12-02 20:27:15,047 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.053) 0:01:02.625 ****** 2025-12-02 20:27:15,471 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:15,495 p=13428 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-12-02 20:27:15,495 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.447) 0:01:03.074 ****** 2025-12-02 20:27:15,495 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.447) 0:01:03.073 ****** 2025-12-02 20:27:15,537 p=13428 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-12-02 20:27:15,550 p=13428 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-12-02 20:27:15,550 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.054) 0:01:03.129 ****** 2025-12-02 20:27:15,550 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:15 +0000 (0:00:00.054) 0:01:03.128 ****** 2025-12-02 20:27:16,086 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:16,094 p=13428 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-12-02 20:27:16,094 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.544) 0:01:03.674 ****** 2025-12-02 20:27:16,095 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.544) 0:01:03.672 ****** 2025-12-02 20:27:16,120 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:16,180 p=13428 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-12-02 20:27:16,180 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.085) 0:01:03.759 ****** 2025-12-02 20:27:16,180 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.085) 0:01:03.758 ****** 2025-12-02 20:27:16,917 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:16,936 p=13428 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-12-02 20:27:16,936 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.756) 0:01:04.515 ****** 2025-12-02 20:27:16,936 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:16 +0000 (0:00:00.756) 0:01:04.514 ****** 2025-12-02 20:27:16,981 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:17,009 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-12-02 20:27:17,009 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.073) 0:01:04.589 ****** 2025-12-02 20:27:17,010 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.073) 0:01:04.588 ****** 2025-12-02 20:27:17,544 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:17,573 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:27:17,573 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.563) 0:01:05.152 ****** 2025-12-02 20:27:17,573 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.563) 0:01:05.151 ****** 2025-12-02 20:27:17,674 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:17,691 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:27:17,692 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.118) 0:01:05.271 ****** 2025-12-02 20:27:17,692 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.118) 0:01:05.270 ****** 2025-12-02 20:27:17,778 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:17,800 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:27:17,800 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.108) 0:01:05.379 ****** 2025-12-02 20:27:17,800 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.108) 0:01:05.378 ****** 2025-12-02 20:27:17,930 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-12-02 20:27:17,948 p=13428 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-12-02 20:27:17,948 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.147) 0:01:05.527 ****** 2025-12-02 20:27:17,948 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:17 +0000 (0:00:00.147) 0:01:05.526 ****** 2025-12-02 20:27:18,006 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:18,024 p=13428 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-12-02 20:27:18,024 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.076) 0:01:05.604 ****** 2025-12-02 20:27:18,024 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.076) 0:01:05.602 ****** 2025-12-02 20:27:18,298 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:18,317 p=13428 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-12-02 20:27:18,317 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.292) 0:01:05.896 ****** 2025-12-02 20:27:18,317 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.292) 0:01:05.895 ****** 2025-12-02 20:27:18,338 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:18,351 p=13428 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-12-02 20:27:18,351 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.034) 0:01:05.930 ****** 2025-12-02 20:27:18,351 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.034) 0:01:05.929 ****** 2025-12-02 20:27:18,574 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:18,585 p=13428 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-12-02 20:27:18,585 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.233) 0:01:06.164 ****** 2025-12-02 20:27:18,585 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.233) 0:01:06.163 ****** 2025-12-02 20:27:18,608 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:18,620 p=13428 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-12-02 20:27:18,620 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.035) 0:01:06.199 ****** 2025-12-02 20:27:18,620 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.035) 0:01:06.198 ****** 2025-12-02 20:27:18,848 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:18,862 p=13428 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-02 20:27:18,862 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.241) 0:01:06.441 ****** 2025-12-02 20:27:18,862 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:18 +0000 (0:00:00.241) 0:01:06.440 ****** 2025-12-02 20:27:19,135 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:19,158 p=13428 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-12-02 20:27:19,158 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:19 +0000 (0:00:00.296) 0:01:06.737 ****** 2025-12-02 20:27:19,158 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:19 +0000 (0:00:00.296) 0:01:06.736 ****** 2025-12-02 20:27:19,216 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2025-12-02 20:27:55,464 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:55,483 p=13428 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-12-02 20:27:55,484 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:36.325) 0:01:43.063 ****** 2025-12-02 20:27:55,484 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:36.325) 0:01:43.062 ****** 2025-12-02 20:27:55,510 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:55,518 p=13428 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-02 20:27:55,518 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.034) 0:01:43.097 ****** 2025-12-02 20:27:55,518 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.034) 0:01:43.096 ****** 2025-12-02 20:27:55,731 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:55,739 p=13428 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-12-02 20:27:55,739 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.221) 0:01:43.319 ****** 2025-12-02 20:27:55,740 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.221) 0:01:43.317 ****** 2025-12-02 20:27:55,754 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:55,789 p=13428 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-12-02 20:27:55,808 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:27:55,808 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.068) 0:01:43.387 ****** 2025-12-02 20:27:55,808 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.068) 0:01:43.386 ****** 2025-12-02 20:27:55,858 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:55,870 p=13428 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-12-02 20:27:55,870 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.061) 0:01:43.449 ****** 2025-12-02 20:27:55,870 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.061) 0:01:43.448 ****** 2025-12-02 20:27:55,895 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:55,903 p=13428 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-12-02 20:27:55,903 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.033) 0:01:43.483 ****** 2025-12-02 20:27:55,904 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.033) 0:01:43.481 ****** 2025-12-02 20:27:55,923 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:55,959 p=13428 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-12-02 20:27:55,997 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:27:55,997 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.093) 0:01:43.576 ****** 2025-12-02 20:27:55,997 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:55 +0000 (0:00:00.093) 0:01:43.575 ****** 2025-12-02 20:27:56,043 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:56,053 p=13428 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-12-02 20:27:56,053 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.055) 0:01:43.632 ****** 2025-12-02 20:27:56,053 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.055) 0:01:43.631 ****** 2025-12-02 20:27:56,237 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:56,257 p=13428 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-12-02 20:27:56,258 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.204) 0:01:43.837 ****** 2025-12-02 20:27:56,258 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.205) 0:01:43.836 ****** 2025-12-02 20:27:56,285 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:56,302 p=13428 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-12-02 20:27:56,302 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.044) 0:01:43.882 ****** 2025-12-02 20:27:56,303 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.044) 0:01:43.881 ****** 2025-12-02 20:27:56,331 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:56,344 p=13428 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-12-02 20:27:56,344 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.041) 0:01:43.923 ****** 2025-12-02 20:27:56,344 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.041) 0:01:43.922 ****** 2025-12-02 20:27:56,377 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:56,397 p=13428 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-12-02 20:27:56,397 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.053) 0:01:43.976 ****** 2025-12-02 20:27:56,397 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.053) 0:01:43.975 ****** 2025-12-02 20:27:56,426 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:56,437 p=13428 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-12-02 20:27:56,438 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.040) 0:01:44.017 ****** 2025-12-02 20:27:56,438 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.040) 0:01:44.016 ****** 2025-12-02 20:27:56,766 p=13428 u=zuul n=ansible | TASK [rhol_crc : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-12-02 20:27:56,766 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.328) 0:01:44.345 ****** 2025-12-02 20:27:56,766 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:56 +0000 (0:00:00.328) 0:01:44.344 ****** 2025-12-02 20:27:57,010 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-12-02 20:27:57,235 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-12-02 20:27:57,455 p=13428 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/bin) 2025-12-02 20:27:57,471 p=13428 u=zuul n=ansible | TASK [manage_secrets : Ensure directory tree exist path={{ cifmw_manage_secrets_basedir }}/secrets, state=directory, owner={{ cifmw_manage_secrets_owner }}, mode=0700] *** 2025-12-02 20:27:57,471 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.704) 0:01:45.050 ****** 2025-12-02 20:27:57,471 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.704) 0:01:45.049 ****** 2025-12-02 20:27:57,704 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:57,724 p=13428 u=zuul n=ansible | TASK [rhol_crc : Check for binary path={{ cifmw_rhol_crc_binary }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-12-02 20:27:57,725 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.253) 0:01:45.304 ****** 2025-12-02 20:27:57,725 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.253) 0:01:45.303 ****** 2025-12-02 20:27:57,937 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:57,946 p=13428 u=zuul n=ansible | TASK [rhol_crc : Get versions if binary is available _raw_params=get_versions.yml] *** 2025-12-02 20:27:57,946 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.221) 0:01:45.525 ****** 2025-12-02 20:27:57,946 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.221) 0:01:45.524 ****** 2025-12-02 20:27:57,979 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/rhol_crc/tasks/get_versions.yml for localhost 2025-12-02 20:27:57,994 p=13428 u=zuul n=ansible | TASK [rhol_crc : Get CRC binary version _raw_params={{ cifmw_rhol_crc_binary }} version] *** 2025-12-02 20:27:57,994 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.048) 0:01:45.574 ****** 2025-12-02 20:27:57,994 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:57 +0000 (0:00:00.048) 0:01:45.572 ****** 2025-12-02 20:27:58,797 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:27:58,810 p=13428 u=zuul n=ansible | TASK [rhol_crc : Extract versions crc_version={{ _crc_vers.stdout_lines | select('match', 'CRC') | first | regex_replace('^CRC version: ([0-9\.]+).*$', '\1') }}, crc_openshift_version={{ _crc_vers.stdout_lines | select ('match', 'OpenShift') | first | regex_replace('^OpenShift version: (.*)$', '\1') }}] *** 2025-12-02 20:27:58,810 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.815) 0:01:46.390 ****** 2025-12-02 20:27:58,810 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.816) 0:01:46.388 ****** 2025-12-02 20:27:58,839 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:58,848 p=13428 u=zuul n=ansible | TASK [rhol_crc : Output found binary location and versions msg=Found crc at {{ cifmw_rhol_crc_binary }}, with version {{ crc_version }} (wants: {{ cifmw_rhol_crc_version }}) and serving OpenShift version {{ crc_openshift_version }}.] *** 2025-12-02 20:27:58,848 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.037) 0:01:46.427 ****** 2025-12-02 20:27:58,848 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.037) 0:01:46.426 ****** 2025-12-02 20:27:58,869 p=13428 u=zuul n=ansible | ok: [localhost] => msg: 'Found crc at /usr/local/bin/crc, with version 2.48.0 (wants: 2.39.0) and serving OpenShift version 4.18.1.' 2025-12-02 20:27:58,878 p=13428 u=zuul n=ansible | TASK [rhol_crc : Get CRC VM availability command=info, uri=qemu:///system] ***** 2025-12-02 20:27:58,878 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.029) 0:01:46.457 ****** 2025-12-02 20:27:58,878 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:58 +0000 (0:00:00.029) 0:01:46.456 ****** 2025-12-02 20:27:59,356 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:59,365 p=13428 u=zuul n=ansible | TASK [rhol_crc : Set CRC status crc_bin_available={{ _crc_bin.stat.exists }}, crc_present={{ _domains is defined and 'crc' in _domains }}, crc_running={{ _domain is defined and 'crc' in _domains and _domains.crc.state == 'running' }}] *** 2025-12-02 20:27:59,365 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.487) 0:01:46.945 ****** 2025-12-02 20:27:59,366 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.487) 0:01:46.944 ****** 2025-12-02 20:27:59,412 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:59,424 p=13428 u=zuul n=ansible | TASK [rhol_crc : Fail if crc domain is already defined msg=The crc domain already exist. Set cifmw_rhol_crc_force_cleanup to true to force the cleanup. Interrupting tasks.] *** 2025-12-02 20:27:59,424 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.058) 0:01:47.004 ****** 2025-12-02 20:27:59,424 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.058) 0:01:47.002 ****** 2025-12-02 20:27:59,447 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,458 p=13428 u=zuul n=ansible | TASK [Ensure pull-secret is in place if we need to configure CRC name=manage_secrets, tasks_from=pull_secret.yml] *** 2025-12-02 20:27:59,458 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.033) 0:01:47.037 ****** 2025-12-02 20:27:59,458 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.033) 0:01:47.036 ****** 2025-12-02 20:27:59,540 p=13428 u=zuul n=ansible | TASK [manage_secrets : Assert we get needed data quiet=True, that=['cifmw_manage_secrets_pullsecret_file != None or cifmw_manage_secrets_pullsecret_content != None', 'not (cifmw_manage_secrets_pullsecret_file != None and cifmw_manage_secrets_pullsecret_content != None)'], msg=Please provide EITHER cifmw_manage_secrets_pullsecret_file OR cifmw_manage_secrets_pullsecret_content - not both. ] *** 2025-12-02 20:27:59,540 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.082) 0:01:47.120 ****** 2025-12-02 20:27:59,541 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.082) 0:01:47.118 ****** 2025-12-02 20:27:59,567 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:27:59,579 p=13428 u=zuul n=ansible | TASK [manage_secrets : Manage secret _raw_params=_push_secret.yml] ************* 2025-12-02 20:27:59,579 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.038) 0:01:47.158 ****** 2025-12-02 20:27:59,579 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.038) 0:01:47.157 ****** 2025-12-02 20:27:59,611 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/manage_secrets/tasks/_push_secret.yml for localhost 2025-12-02 20:27:59,625 p=13428 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_dest var=_secret_dest] ******************** 2025-12-02 20:27:59,625 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.046) 0:01:47.204 ****** 2025-12-02 20:27:59,625 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.046) 0:01:47.203 ****** 2025-12-02 20:27:59,666 p=13428 u=zuul n=ansible | ok: [localhost] => _secret_dest: /home/zuul/pull-secret.json 2025-12-02 20:27:59,674 p=13428 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_file var=_secret_file] ******************** 2025-12-02 20:27:59,675 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.049) 0:01:47.254 ****** 2025-12-02 20:27:59,675 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.049) 0:01:47.253 ****** 2025-12-02 20:27:59,694 p=13428 u=zuul n=ansible | ok: [localhost] => _secret_file: null 2025-12-02 20:27:59,703 p=13428 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_content var=_secret_content] ************** 2025-12-02 20:27:59,703 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.028) 0:01:47.282 ****** 2025-12-02 20:27:59,703 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.028) 0:01:47.281 ****** 2025-12-02 20:27:59,733 p=13428 u=zuul n=ansible | ok: [localhost] => _secret_content: {}********** 2025-12-02 20:27:59,742 p=13428 u=zuul n=ansible | TASK [manage_secrets : Ensure parameter is an absolute path that=['_secret_file is ansible.builtin.abs'], msg={{ _secret_file }} must be an absolute path ] *** 2025-12-02 20:27:59,742 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.038) 0:01:47.321 ****** 2025-12-02 20:27:59,742 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.038) 0:01:47.320 ****** 2025-12-02 20:27:59,768 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,788 p=13428 u=zuul n=ansible | TASK [manage_secrets : Check if pull secret src file exists path={{ _secret_file }}] *** 2025-12-02 20:27:59,788 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.046) 0:01:47.367 ****** 2025-12-02 20:27:59,788 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.046) 0:01:47.366 ****** 2025-12-02 20:27:59,810 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,830 p=13428 u=zuul n=ansible | TASK [manage_secrets : Copy file to location remote_src={{ _ps_exists.stat.exists | default(false) }}, dest={{ _secret_dest }}, src={{ _secret_file }}, mode=0600, owner={{ cifmw_manage_secrets_owner }}] *** 2025-12-02 20:27:59,830 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.042) 0:01:47.410 ****** 2025-12-02 20:27:59,830 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.042) 0:01:47.408 ****** 2025-12-02 20:27:59,849 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,860 p=13428 u=zuul n=ansible | TASK [manage_secrets : Create file from content] ******************************* 2025-12-02 20:27:59,860 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.030) 0:01:47.440 ****** 2025-12-02 20:27:59,861 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.030) 0:01:47.438 ****** 2025-12-02 20:27:59,895 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,916 p=13428 u=zuul n=ansible | TASK [rhol_crc : Get wanted RHOL/CRC version binary if needed _raw_params=binary.yml] *** 2025-12-02 20:27:59,916 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.055) 0:01:47.495 ****** 2025-12-02 20:27:59,916 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.055) 0:01:47.494 ****** 2025-12-02 20:27:59,945 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:27:59,958 p=13428 u=zuul n=ansible | TASK [rhol_crc : Setup sudoers file for sudo commands in RHOL/CRC setup _raw_params=sudoers_grant.yml] *** 2025-12-02 20:27:59,958 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.042) 0:01:47.538 ****** 2025-12-02 20:27:59,959 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:27:59 +0000 (0:00:00.042) 0:01:47.536 ****** 2025-12-02 20:27:59,987 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:00,004 p=13428 u=zuul n=ansible | TASK [rhol_crc : Clean RHOL/CRC if wanted _raw_params=cleanup.yml] ************* 2025-12-02 20:28:00,004 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.045) 0:01:47.583 ****** 2025-12-02 20:28:00,004 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.045) 0:01:47.582 ****** 2025-12-02 20:28:00,021 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:00,036 p=13428 u=zuul n=ansible | TASK [rhol_crc : Set RHOL/CRC configuration options _raw_params=configuration.yml] *** 2025-12-02 20:28:00,036 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.031) 0:01:47.615 ****** 2025-12-02 20:28:00,036 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.031) 0:01:47.614 ****** 2025-12-02 20:28:00,058 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:00,067 p=13428 u=zuul n=ansible | TASK [rhol_crc : Setup RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} setup 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-setup.log] *** 2025-12-02 20:28:00,067 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.031) 0:01:47.646 ****** 2025-12-02 20:28:00,067 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.031) 0:01:47.645 ****** 2025-12-02 20:28:00,084 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:00,093 p=13428 u=zuul n=ansible | TASK [rhol_crc : Start RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} start 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-start.log] *** 2025-12-02 20:28:00,093 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.025) 0:01:47.672 ****** 2025-12-02 20:28:00,093 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.025) 0:01:47.671 ****** 2025-12-02 20:28:00,688 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:00,700 p=13428 u=zuul n=ansible | TASK [rhol_crc : List VMs command=list_vms] ************************************ 2025-12-02 20:28:00,701 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.607) 0:01:48.280 ****** 2025-12-02 20:28:00,701 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.607) 0:01:48.279 ****** 2025-12-02 20:28:00,965 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:00,977 p=13428 u=zuul n=ansible | TASK [rhol_crc : Output VMs var=_vm_list] ************************************** 2025-12-02 20:28:00,978 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.277) 0:01:48.557 ****** 2025-12-02 20:28:00,978 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:00 +0000 (0:00:00.277) 0:01:48.556 ****** 2025-12-02 20:28:01,006 p=13428 u=zuul n=ansible | ok: [localhost] => _vm_list: changed: false failed: false list_vms: - crc 2025-12-02 20:28:01,014 p=13428 u=zuul n=ansible | TASK [rhol_crc : List networks command=list_nets] ****************************** 2025-12-02 20:28:01,014 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.036) 0:01:48.593 ****** 2025-12-02 20:28:01,014 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.036) 0:01:48.592 ****** 2025-12-02 20:28:01,442 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:01,460 p=13428 u=zuul n=ansible | TASK [rhol_crc : Output networks var=_net_list] ******************************** 2025-12-02 20:28:01,461 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.446) 0:01:49.040 ****** 2025-12-02 20:28:01,461 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.446) 0:01:49.039 ****** 2025-12-02 20:28:01,491 p=13428 u=zuul n=ansible | ok: [localhost] => _net_list: changed: false failed: false list_nets: - crc - default 2025-12-02 20:28:01,510 p=13428 u=zuul n=ansible | TASK [libvirt_manager : Get virtual network information command=info, uri=qemu:///system] *** 2025-12-02 20:28:01,510 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.049) 0:01:49.089 ****** 2025-12-02 20:28:01,510 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.049) 0:01:49.088 ****** 2025-12-02 20:28:01,855 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:01,875 p=13428 u=zuul n=ansible | TASK [libvirt_manager : Create network to bridge mapping _net_bridge_map={{ _net_bridge_map | default({}) | combine(_local_map, recursive=true) }}] *** 2025-12-02 20:28:01,876 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.365) 0:01:49.455 ****** 2025-12-02 20:28:01,876 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.365) 0:01:49.454 ****** 2025-12-02 20:28:01,936 p=13428 u=zuul n=ansible | ok: [localhost] => (item=crc) 2025-12-02 20:28:01,947 p=13428 u=zuul n=ansible | ok: [localhost] => (item=default) 2025-12-02 20:28:01,967 p=13428 u=zuul n=ansible | TASK [libvirt_manager : Dump domain xml command=get_xml, name={{ vm_name }}, uri=qemu:///system] *** 2025-12-02 20:28:01,967 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.091) 0:01:49.546 ****** 2025-12-02 20:28:01,967 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:01 +0000 (0:00:00.091) 0:01:49.545 ****** 2025-12-02 20:28:02,282 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:02,295 p=13428 u=zuul n=ansible | TASK [libvirt_manager : Extract networks from XML xmlstring={{ _domain_xml.get_xml }}, xpath=/domain/devices/interface/source, content=attribute] *** 2025-12-02 20:28:02,295 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:02 +0000 (0:00:00.327) 0:01:49.874 ****** 2025-12-02 20:28:02,295 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:02 +0000 (0:00:00.327) 0:01:49.873 ****** 2025-12-02 20:28:02,674 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:02,685 p=13428 u=zuul n=ansible | TASK [libvirt_manager : Attach interface default on crc _raw_params=virsh -c qemu:///system attach-interface "{{ vm_name }}" --source "{{ _local_bridge_name }}" --type "{{ _type }}" --mac "{{ _lm_mac_address }}" --model virtio --config --persistent] *** 2025-12-02 20:28:02,686 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:02 +0000 (0:00:00.390) 0:01:50.265 ****** 2025-12-02 20:28:02,686 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:02 +0000 (0:00:00.390) 0:01:50.264 ****** 2025-12-02 20:28:03,125 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:03,147 p=13428 u=zuul n=ansible | TASK [rhol_crc : Revoke permissions granted in sudoers file for CRC/RHOL setup name={{ cifmw_rhol_crc_sudoers_file_name }}, state=absent] *** 2025-12-02 20:28:03,147 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.461) 0:01:50.727 ****** 2025-12-02 20:28:03,147 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.461) 0:01:50.725 ****** 2025-12-02 20:28:03,504 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:03,517 p=13428 u=zuul n=ansible | TASK [openshift_login : Assert we have needed parameters that=['cifmw_openshift_login_load_kubeconfig is defined', 'cifmw_openshift_login_load_kubeconfig is not none', 'cifmw_openshift_login_load_kubeadmin is defined', 'cifmw_openshift_login_load_kubeadmin is not none']] *** 2025-12-02 20:28:03,517 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.369) 0:01:51.096 ****** 2025-12-02 20:28:03,517 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.369) 0:01:51.095 ****** 2025-12-02 20:28:03,590 p=13428 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-02 20:28:03,603 p=13428 u=zuul n=ansible | TASK [openshift_login : Stat kubeconfig path={{ cifmw_openshift_login_load_kubeconfig }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-12-02 20:28:03,603 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.085) 0:01:51.182 ****** 2025-12-02 20:28:03,603 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.085) 0:01:51.181 ****** 2025-12-02 20:28:03,824 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:03,833 p=13428 u=zuul n=ansible | TASK [openshift_login : Stat kubeadmin path={{ cifmw_openshift_login_load_kubeadmin }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-12-02 20:28:03,833 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.229) 0:01:51.412 ****** 2025-12-02 20:28:03,833 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:03 +0000 (0:00:00.229) 0:01:51.411 ****** 2025-12-02 20:28:04,018 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:04,032 p=13428 u=zuul n=ansible | TASK [openshift_login : Assert files exist that=['_stat_config.stat.exists', '_stat_admin.stat.exists']] *** 2025-12-02 20:28:04,032 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.198) 0:01:51.611 ****** 2025-12-02 20:28:04,032 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.199) 0:01:51.610 ****** 2025-12-02 20:28:04,073 p=13428 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-02 20:28:04,082 p=13428 u=zuul n=ansible | TASK [openshift_login : Gather the password of the deployed cluster. src={{ cifmw_openshift_login_load_kubeadmin }}] *** 2025-12-02 20:28:04,082 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.050) 0:01:51.661 ****** 2025-12-02 20:28:04,082 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.050) 0:01:51.660 ****** 2025-12-02 20:28:04,451 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:04,471 p=13428 u=zuul n=ansible | TASK [openshift_login : Gather the deployed OCP configuration. path={{ cifmw_openshift_login_load_kubeconfig }}] *** 2025-12-02 20:28:04,472 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.389) 0:01:52.051 ****** 2025-12-02 20:28:04,472 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.389) 0:01:52.050 ****** 2025-12-02 20:28:04,668 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:04,687 p=13428 u=zuul n=ansible | TASK [openshift_login : Set the OpenShift platform access information. cifmw_openshift_api={{ kubeconf.clusters[0].cluster.server }}, cifmw_openshift_user=kubeadmin, cifmw_openshift_password={{ kubeadmin_password.content | b64decode }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_load_kubeconfig }}, cacheable=True] *** 2025-12-02 20:28:04,687 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.215) 0:01:52.266 ****** 2025-12-02 20:28:04,687 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.215) 0:01:52.265 ****** 2025-12-02 20:28:04,717 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:04,734 p=13428 u=zuul n=ansible | TASK [rhol_crc : Make sure kubeconfig file exists path={{ cifmw_rhol_crc_kubeconfig }}] *** 2025-12-02 20:28:04,734 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.046) 0:01:52.313 ****** 2025-12-02 20:28:04,734 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.046) 0:01:52.312 ****** 2025-12-02 20:28:04,760 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:04,769 p=13428 u=zuul n=ansible | TASK [rhol_crc : Warn the user that the kubeconfig files doesn't exist msg=The kubeconfig file was not found at {{ cifmw_rhol_crc_kubeconfig }}.] *** 2025-12-02 20:28:04,769 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.035) 0:01:52.349 ****** 2025-12-02 20:28:04,769 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.035) 0:01:52.347 ****** 2025-12-02 20:28:04,788 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:04,807 p=13428 u=zuul n=ansible | TASK [rhol_crc : Add crc creds in the user bashrc file dest=~/.bashrc, create=True, block=if command -v crc; then eval "$(crc oc-env --shell bash)" fi export KUBECONFIG="{{ cifmw_rhol_crc_kubeconfig }}", mode=0644] *** 2025-12-02 20:28:04,807 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.037) 0:01:52.387 ****** 2025-12-02 20:28:04,807 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.038) 0:01:52.385 ****** 2025-12-02 20:28:04,829 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:04,848 p=13428 u=zuul n=ansible | TASK [rhol_crc : Source bashrc and confirm crc login executable=/bin/bash, _raw_params=source ~/.bashrc oc whoami ] *** 2025-12-02 20:28:04,848 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.040) 0:01:52.427 ****** 2025-12-02 20:28:04,848 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.040) 0:01:52.426 ****** 2025-12-02 20:28:04,866 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:04,878 p=13428 u=zuul n=ansible | TASK [rhol_crc : Check bashrc results var=bashrc_result.stdout] **************** 2025-12-02 20:28:04,879 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.030) 0:01:52.458 ****** 2025-12-02 20:28:04,879 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.030) 0:01:52.457 ****** 2025-12-02 20:28:04,898 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:04,909 p=13428 u=zuul n=ansible | TASK [rhol_crc : Check if using systemd dnsmasq path={{ _dnsmasq_config }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-12-02 20:28:04,909 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.030) 0:01:52.489 ****** 2025-12-02 20:28:04,909 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:04 +0000 (0:00:00.030) 0:01:52.487 ****** 2025-12-02 20:28:06,751 p=13428 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-12-02 20:28:06,752 p=13428 u=zuul n=ansible | ok: [localhost -> crc(api.crc.testing)] 2025-12-02 20:28:06,773 p=13428 u=zuul n=ansible | TASK [rhol_crc : Configure dnsmasq listen-address to listen on both br-ex and ospbr path={{ _dnsmasq_config }}, insertafter=^listen-address=, line=listen-address={{ _crc_ip | ansible.utils.ipaddr('address') }}] *** 2025-12-02 20:28:06,774 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:06 +0000 (0:00:01.864) 0:01:54.353 ****** 2025-12-02 20:28:06,774 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:06 +0000 (0:00:01.864) 0:01:54.352 ****** 2025-12-02 20:28:07,613 p=13428 u=zuul n=ansible | [WARNING]: Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually 2025-12-02 20:28:07,614 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2025-12-02 20:28:07,634 p=13428 u=zuul n=ansible | TASK [rhol_crc : Restart DNS in CRC VM name=dnsmasq, state=restarted] ********** 2025-12-02 20:28:07,634 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:07 +0000 (0:00:00.860) 0:01:55.214 ****** 2025-12-02 20:28:07,634 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:07 +0000 (0:00:00.860) 0:01:55.212 ****** 2025-12-02 20:28:09,572 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2025-12-02 20:28:09,589 p=13428 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-12-02 20:28:09,589 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:01.954) 0:01:57.168 ****** 2025-12-02 20:28:09,589 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:01.954) 0:01:57.167 ****** 2025-12-02 20:28:09,613 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:09,621 p=13428 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-02 20:28:09,622 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.032) 0:01:57.201 ****** 2025-12-02 20:28:09,622 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.032) 0:01:57.200 ****** 2025-12-02 20:28:09,869 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:09,880 p=13428 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-12-02 20:28:09,880 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.258) 0:01:57.459 ****** 2025-12-02 20:28:09,880 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.258) 0:01:57.458 ****** 2025-12-02 20:28:09,925 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-12-02 20:28:09,944 p=13428 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-12-02 20:28:09,945 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.064) 0:01:57.524 ****** 2025-12-02 20:28:09,945 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:09 +0000 (0:00:00.064) 0:01:57.523 ****** 2025-12-02 20:28:09,988 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,009 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-12-02 20:28:10,009 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.064) 0:01:57.588 ****** 2025-12-02 20:28:10,009 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.064) 0:01:57.587 ****** 2025-12-02 20:28:10,052 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,062 p=13428 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-12-02 20:28:10,062 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.052) 0:01:57.641 ****** 2025-12-02 20:28:10,062 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.052) 0:01:57.640 ****** 2025-12-02 20:28:10,094 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,107 p=13428 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{********** cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-12-02 20:28:10,107 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.045) 0:01:57.686 ****** 2025-12-02 20:28:10,107 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.045) 0:01:57.685 ****** 2025-12-02 20:28:10,144 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:10,154 p=13428 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-12-02 20:28:10,154 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.047) 0:01:57.733 ****** 2025-12-02 20:28:10,154 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.046) 0:01:57.732 ****** 2025-12-02 20:28:10,436 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:10,455 p=13428 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-12-02 20:28:10,456 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.301) 0:01:58.035 ****** 2025-12-02 20:28:10,456 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.301) 0:01:58.034 ****** 2025-12-02 20:28:10,494 p=13428 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-02 20:28:10,510 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-12-02 20:28:10,511 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.055) 0:01:58.090 ****** 2025-12-02 20:28:10,511 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.055) 0:01:58.089 ****** 2025-12-02 20:28:10,551 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,570 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-12-02 20:28:10,570 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.059) 0:01:58.149 ****** 2025-12-02 20:28:10,570 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.059) 0:01:58.148 ****** 2025-12-02 20:28:10,612 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,636 p=13428 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-12-02 20:28:10,636 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.066) 0:01:58.216 ****** 2025-12-02 20:28:10,636 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.066) 0:01:58.214 ****** 2025-12-02 20:28:10,683 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,697 p=13428 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-12-02 20:28:10,698 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.061) 0:01:58.277 ****** 2025-12-02 20:28:10,698 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.061) 0:01:58.276 ****** 2025-12-02 20:28:10,745 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:10,757 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-12-02 20:28:10,757 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.059) 0:01:58.337 ****** 2025-12-02 20:28:10,758 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.059) 0:01:58.336 ****** 2025-12-02 20:28:10,797 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-12-02 20:28:10,812 p=13428 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-12-02 20:28:10,812 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.054) 0:01:58.392 ****** 2025-12-02 20:28:10,812 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.054) 0:01:58.390 ****** 2025-12-02 20:28:10,840 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:10,853 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-12-02 20:28:10,854 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.041) 0:01:58.433 ****** 2025-12-02 20:28:10,854 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:10 +0000 (0:00:00.041) 0:01:58.432 ****** 2025-12-02 20:28:10,935 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-12-02 20:28:11,519 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:11,530 p=13428 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-12-02 20:28:11,530 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.676) 0:01:59.109 ****** 2025-12-02 20:28:11,530 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.676) 0:01:59.108 ****** 2025-12-02 20:28:11,558 p=13428 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-12-02 20:28:11,574 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-12-02 20:28:11,574 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.044) 0:01:59.154 ****** 2025-12-02 20:28:11,574 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.044) 0:01:59.152 ****** 2025-12-02 20:28:11,935 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:11,955 p=13428 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-12-02 20:28:11,955 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.380) 0:01:59.534 ****** 2025-12-02 20:28:11,955 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:11 +0000 (0:00:00.380) 0:01:59.533 ****** 2025-12-02 20:28:11,988 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:12,004 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-12-02 20:28:12,004 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:12 +0000 (0:00:00.049) 0:01:59.584 ****** 2025-12-02 20:28:12,004 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:12 +0000 (0:00:00.049) 0:01:59.582 ****** 2025-12-02 20:28:12,639 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:12,657 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-12-02 20:28:12,658 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:12 +0000 (0:00:00.653) 0:02:00.237 ****** 2025-12-02 20:28:12,658 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:12 +0000 (0:00:00.653) 0:02:00.236 ****** 2025-12-02 20:28:13,176 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:13,197 p=13428 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-12-02 20:28:13,198 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.539) 0:02:00.777 ****** 2025-12-02 20:28:13,198 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.539) 0:02:00.776 ****** 2025-12-02 20:28:13,583 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:13,593 p=13428 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-12-02 20:28:13,593 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.395) 0:02:01.172 ****** 2025-12-02 20:28:13,593 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.394) 0:02:01.171 ****** 2025-12-02 20:28:13,635 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:13,645 p=13428 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-12-02 20:28:13,645 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.052) 0:02:01.225 ****** 2025-12-02 20:28:13,645 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:13 +0000 (0:00:00.052) 0:02:01.223 ****** 2025-12-02 20:28:14,142 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:14,150 p=13428 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-12-02 20:28:14,151 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.505) 0:02:01.730 ****** 2025-12-02 20:28:14,151 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.505) 0:02:01.729 ****** 2025-12-02 20:28:14,338 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:14,361 p=13428 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-12-02 20:28:14,361 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.210) 0:02:01.940 ****** 2025-12-02 20:28:14,361 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.210) 0:02:01.939 ****** 2025-12-02 20:28:14,949 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:14,974 p=13428 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-12-02 20:28:14,975 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.613) 0:02:02.554 ****** 2025-12-02 20:28:14,975 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:14 +0000 (0:00:00.613) 0:02:02.553 ****** 2025-12-02 20:28:15,205 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:15,216 p=13428 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-12-02 20:28:15,216 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:15 +0000 (0:00:00.241) 0:02:02.796 ****** 2025-12-02 20:28:15,216 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:15 +0000 (0:00:00.241) 0:02:02.794 ****** 2025-12-02 20:28:15,266 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:15,295 p=13428 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-12-02 20:28:15,295 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:15 +0000 (0:00:00.078) 0:02:02.875 ****** 2025-12-02 20:28:15,296 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:15 +0000 (0:00:00.079) 0:02:02.873 ****** 2025-12-02 20:28:16,340 p=13428 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-12-02 20:28:17,858 p=13428 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-12-02 20:28:17,878 p=13428 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-12-02 20:28:17,878 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:02.582) 0:02:05.457 ****** 2025-12-02 20:28:17,878 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:02.582) 0:02:05.456 ****** 2025-12-02 20:28:17,905 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:17,917 p=13428 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-12-02 20:28:17,917 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:00.038) 0:02:05.496 ****** 2025-12-02 20:28:17,917 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:00.038) 0:02:05.495 ****** 2025-12-02 20:28:17,942 p=13428 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-12-02 20:28:17,943 p=13428 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-12-02 20:28:17,944 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:17,958 p=13428 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-12-02 20:28:17,959 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:00.041) 0:02:05.538 ****** 2025-12-02 20:28:17,959 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:17 +0000 (0:00:00.041) 0:02:05.537 ****** 2025-12-02 20:28:18,000 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,009 p=13428 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-12-02 20:28:18,010 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.051) 0:02:05.589 ****** 2025-12-02 20:28:18,010 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.051) 0:02:05.588 ****** 2025-12-02 20:28:18,038 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,052 p=13428 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-12-02 20:28:18,052 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.042) 0:02:05.631 ****** 2025-12-02 20:28:18,052 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.042) 0:02:05.630 ****** 2025-12-02 20:28:18,107 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,128 p=13428 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-12-02 20:28:18,128 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.076) 0:02:05.708 ****** 2025-12-02 20:28:18,129 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.076) 0:02:05.707 ****** 2025-12-02 20:28:18,157 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,176 p=13428 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-12-02 20:28:18,176 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.047) 0:02:05.755 ****** 2025-12-02 20:28:18,176 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.047) 0:02:05.754 ****** 2025-12-02 20:28:18,202 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,215 p=13428 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-12-02 20:28:18,215 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.039) 0:02:05.794 ****** 2025-12-02 20:28:18,215 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.039) 0:02:05.793 ****** 2025-12-02 20:28:18,245 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,258 p=13428 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-12-02 20:28:18,258 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.042) 0:02:05.837 ****** 2025-12-02 20:28:18,258 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.042) 0:02:05.836 ****** 2025-12-02 20:28:18,296 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,308 p=13428 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-12-02 20:28:18,309 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.050) 0:02:05.888 ****** 2025-12-02 20:28:18,309 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.050) 0:02:05.887 ****** 2025-12-02 20:28:18,351 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,362 p=13428 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-12-02 20:28:18,362 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.053) 0:02:05.941 ****** 2025-12-02 20:28:18,362 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.053) 0:02:05.940 ****** 2025-12-02 20:28:18,406 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:18,425 p=13428 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-12-02 20:28:18,425 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.062) 0:02:06.004 ****** 2025-12-02 20:28:18,425 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:18 +0000 (0:00:00.062) 0:02:06.003 ****** 2025-12-02 20:28:19,554 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:19,567 p=13428 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-12-02 20:28:19,567 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:19 +0000 (0:00:01.142) 0:02:07.147 ****** 2025-12-02 20:28:19,567 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:19 +0000 (0:00:01.142) 0:02:07.145 ****** 2025-12-02 20:28:20,655 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:20,666 p=13428 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-12-02 20:28:20,666 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:20 +0000 (0:00:01.099) 0:02:08.246 ****** 2025-12-02 20:28:20,667 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:20 +0000 (0:00:01.099) 0:02:08.244 ****** 2025-12-02 20:28:21,598 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:21,621 p=13428 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-12-02 20:28:21,621 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.954) 0:02:09.200 ****** 2025-12-02 20:28:21,621 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.954) 0:02:09.199 ****** 2025-12-02 20:28:21,655 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:21,676 p=13428 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-12-02 20:28:21,676 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.055) 0:02:09.256 ****** 2025-12-02 20:28:21,676 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.055) 0:02:09.254 ****** 2025-12-02 20:28:21,710 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:21,732 p=13428 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-12-02 20:28:21,732 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.056) 0:02:09.312 ****** 2025-12-02 20:28:21,733 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.056) 0:02:09.310 ****** 2025-12-02 20:28:21,758 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:21,771 p=13428 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-12-02 20:28:21,771 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.038) 0:02:09.350 ****** 2025-12-02 20:28:21,771 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.038) 0:02:09.349 ****** 2025-12-02 20:28:21,798 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:21,810 p=13428 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-12-02 20:28:21,810 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.039) 0:02:09.389 ****** 2025-12-02 20:28:21,810 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.039) 0:02:09.388 ****** 2025-12-02 20:28:21,983 p=13428 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-12-02 20:28:21,983 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.172) 0:02:09.562 ****** 2025-12-02 20:28:21,983 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:21 +0000 (0:00:00.172) 0:02:09.561 ****** 2025-12-02 20:28:22,237 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:22,249 p=13428 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-12-02 20:28:22,249 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:22 +0000 (0:00:00.266) 0:02:09.828 ****** 2025-12-02 20:28:22,249 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:22 +0000 (0:00:00.266) 0:02:09.827 ****** 2025-12-02 20:28:23,136 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:23,145 p=13428 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-12-02 20:28:23,145 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.895) 0:02:10.724 ****** 2025-12-02 20:28:23,145 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.895) 0:02:10.723 ****** 2025-12-02 20:28:23,169 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-12-02 20:28:23,181 p=13428 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-12-02 20:28:23,181 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.035) 0:02:10.760 ****** 2025-12-02 20:28:23,181 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.035) 0:02:10.759 ****** 2025-12-02 20:28:23,943 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:23,962 p=13428 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-12-02 20:28:23,963 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.781) 0:02:11.542 ****** 2025-12-02 20:28:23,963 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:23 +0000 (0:00:00.781) 0:02:11.541 ****** 2025-12-02 20:28:27,875 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:27,920 p=13428 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-12-02 20:28:27,920 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:27 +0000 (0:00:03.957) 0:02:15.500 ****** 2025-12-02 20:28:27,921 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:27 +0000 (0:00:03.957) 0:02:15.498 ****** 2025-12-02 20:28:27,944 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:27,957 p=13428 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-12-02 20:28:27,957 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:27 +0000 (0:00:00.036) 0:02:15.536 ****** 2025-12-02 20:28:27,957 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:27 +0000 (0:00:00.036) 0:02:15.535 ****** 2025-12-02 20:28:29,180 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:29,199 p=13428 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-12-02 20:28:29,199 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:29 +0000 (0:00:01.242) 0:02:16.779 ****** 2025-12-02 20:28:29,200 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:29 +0000 (0:00:01.242) 0:02:16.778 ****** 2025-12-02 20:28:40,042 p=13428 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-12-02 20:28:50,827 p=13428 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-12-02 20:28:51,566 p=13428 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-12-02 20:28:51,606 p=13428 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2025-12-02 20:28:51,606 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:51 +0000 (0:00:22.406) 0:02:39.185 ****** 2025-12-02 20:28:51,606 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:51 +0000 (0:00:22.406) 0:02:39.184 ****** 2025-12-02 20:28:51,863 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:51,875 p=13428 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2025-12-02 20:28:51,875 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:51 +0000 (0:00:00.269) 0:02:39.454 ****** 2025-12-02 20:28:51,875 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:51 +0000 (0:00:00.269) 0:02:39.453 ****** 2025-12-02 20:28:52,985 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:53,004 p=13428 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2025-12-02 20:28:53,005 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:01.129) 0:02:40.584 ****** 2025-12-02 20:28:53,005 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:01.129) 0:02:40.583 ****** 2025-12-02 20:28:53,440 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:53,473 p=13428 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-12-02 20:28:53,474 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.468) 0:02:41.053 ****** 2025-12-02 20:28:53,474 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.468) 0:02:41.052 ****** 2025-12-02 20:28:53,512 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:53,530 p=13428 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-12-02 20:28:53,530 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.056) 0:02:41.109 ****** 2025-12-02 20:28:53,530 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.056) 0:02:41.108 ****** 2025-12-02 20:28:53,562 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:53,580 p=13428 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-12-02 20:28:53,581 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.050) 0:02:41.160 ****** 2025-12-02 20:28:53,581 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.050) 0:02:41.159 ****** 2025-12-02 20:28:53,613 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:53,630 p=13428 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-12-02 20:28:53,631 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.049) 0:02:41.210 ****** 2025-12-02 20:28:53,631 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.049) 0:02:41.209 ****** 2025-12-02 20:28:53,662 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:53,674 p=13428 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-12-02 20:28:53,674 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.043) 0:02:41.253 ****** 2025-12-02 20:28:53,674 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.043) 0:02:41.252 ****** 2025-12-02 20:28:53,720 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:53,731 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:53,731 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.057) 0:02:41.310 ****** 2025-12-02 20:28:53,731 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.057) 0:02:41.309 ****** 2025-12-02 20:28:53,823 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:53,836 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:53,836 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.105) 0:02:41.416 ****** 2025-12-02 20:28:53,837 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.105) 0:02:41.414 ****** 2025-12-02 20:28:53,922 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:53,933 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:53,933 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.096) 0:02:41.512 ****** 2025-12-02 20:28:53,933 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:53 +0000 (0:00:00.096) 0:02:41.511 ****** 2025-12-02 20:28:54,000 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:54,022 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:54,023 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.089) 0:02:41.602 ****** 2025-12-02 20:28:54,023 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.089) 0:02:41.601 ****** 2025-12-02 20:28:54,077 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,095 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:54,096 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.073) 0:02:41.675 ****** 2025-12-02 20:28:54,096 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.073) 0:02:41.674 ****** 2025-12-02 20:28:54,194 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,209 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:54,210 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.113) 0:02:41.789 ****** 2025-12-02 20:28:54,210 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.113) 0:02:41.788 ****** 2025-12-02 20:28:54,307 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:54,324 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:28:54,325 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.114) 0:02:41.904 ****** 2025-12-02 20:28:54,325 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.114) 0:02:41.903 ****** 2025-12-02 20:28:54,383 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,398 p=13428 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-12-02 20:28:54,398 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.073) 0:02:41.978 ****** 2025-12-02 20:28:54,398 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.073) 0:02:41.976 ****** 2025-12-02 20:28:54,427 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:54,445 p=13428 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-12-02 20:28:54,445 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.047) 0:02:42.025 ****** 2025-12-02 20:28:54,446 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.047) 0:02:42.023 ****** 2025-12-02 20:28:54,465 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:54,488 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:54,488 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.042) 0:02:42.068 ****** 2025-12-02 20:28:54,489 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.042) 0:02:42.066 ****** 2025-12-02 20:28:54,565 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,574 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:54,574 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.085) 0:02:42.153 ****** 2025-12-02 20:28:54,574 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.085) 0:02:42.152 ****** 2025-12-02 20:28:54,646 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,657 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:54,657 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.083) 0:02:42.236 ****** 2025-12-02 20:28:54,657 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.083) 0:02:42.235 ****** 2025-12-02 20:28:54,737 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:54,776 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:54,777 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.119) 0:02:42.356 ****** 2025-12-02 20:28:54,777 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.119) 0:02:42.355 ****** 2025-12-02 20:28:54,833 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,845 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:54,845 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.068) 0:02:42.424 ****** 2025-12-02 20:28:54,845 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.068) 0:02:42.423 ****** 2025-12-02 20:28:54,930 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:54,950 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:54,950 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.104) 0:02:42.529 ****** 2025-12-02 20:28:54,950 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:54 +0000 (0:00:00.105) 0:02:42.528 ****** 2025-12-02 20:28:55,064 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:55,079 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:28:55,079 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.129) 0:02:42.658 ****** 2025-12-02 20:28:55,079 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.128) 0:02:42.657 ****** 2025-12-02 20:28:55,138 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,151 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-12-02 20:28:55,152 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.072) 0:02:42.731 ****** 2025-12-02 20:28:55,152 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.072) 0:02:42.730 ****** 2025-12-02 20:28:55,182 p=13428 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-12-02 20:28:55,200 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:55,201 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.048) 0:02:42.780 ****** 2025-12-02 20:28:55,201 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.048) 0:02:42.779 ****** 2025-12-02 20:28:55,291 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,306 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:55,306 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.105) 0:02:42.886 ****** 2025-12-02 20:28:55,306 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.105) 0:02:42.884 ****** 2025-12-02 20:28:55,452 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,460 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:55,460 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.153) 0:02:43.039 ****** 2025-12-02 20:28:55,460 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.153) 0:02:43.038 ****** 2025-12-02 20:28:55,530 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:55,553 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:55,553 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.093) 0:02:43.133 ****** 2025-12-02 20:28:55,553 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.093) 0:02:43.131 ****** 2025-12-02 20:28:55,607 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,615 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:55,615 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.062) 0:02:43.195 ****** 2025-12-02 20:28:55,616 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.062) 0:02:43.194 ****** 2025-12-02 20:28:55,701 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,723 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:55,723 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.107) 0:02:43.302 ****** 2025-12-02 20:28:55,723 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.107) 0:02:43.301 ****** 2025-12-02 20:28:55,800 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:55,818 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:28:55,818 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.095) 0:02:43.397 ****** 2025-12-02 20:28:55,818 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.094) 0:02:43.396 ****** 2025-12-02 20:28:55,862 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:55,876 p=13428 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-12-02 20:28:55,876 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.058) 0:02:43.456 ****** 2025-12-02 20:28:55,877 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.058) 0:02:43.455 ****** 2025-12-02 20:28:55,913 p=13428 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-12-02 20:28:55,919 p=13428 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-12-02 20:28:55,920 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:55,933 p=13428 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-12-02 20:28:55,933 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.056) 0:02:43.513 ****** 2025-12-02 20:28:55,933 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.056) 0:02:43.511 ****** 2025-12-02 20:28:55,958 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:55,977 p=13428 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-12-02 20:28:55,977 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.044) 0:02:43.557 ****** 2025-12-02 20:28:55,977 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:55 +0000 (0:00:00.044) 0:02:43.555 ****** 2025-12-02 20:28:56,028 p=13428 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '503', 'change_url': 'https://github.com/openstack-k8s-operators/infra-operator/pull/503', 'commit_id': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'patchset': 'c5a57d0b7398bd15bfffee9b3489b72b1188ccfb', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/infra-operator', 'name': 'openstack-k8s-operators/infra-operator', 'short_name': 'infra-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/infra-operator'}, 'topic': None}) 2025-12-02 20:28:56,030 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,052 p=13428 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-12-02 20:28:56,053 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.075) 0:02:43.632 ****** 2025-12-02 20:28:56,053 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.075) 0:02:43.631 ****** 2025-12-02 20:28:56,082 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,094 p=13428 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-12-02 20:28:56,095 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.041) 0:02:43.674 ****** 2025-12-02 20:28:56,095 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.041) 0:02:43.673 ****** 2025-12-02 20:28:56,122 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,137 p=13428 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-12-02 20:28:56,137 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.042) 0:02:43.717 ****** 2025-12-02 20:28:56,138 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.042) 0:02:43.715 ****** 2025-12-02 20:28:56,182 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,192 p=13428 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-12-02 20:28:56,192 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.054) 0:02:43.772 ****** 2025-12-02 20:28:56,192 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.054) 0:02:43.770 ****** 2025-12-02 20:28:56,244 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,255 p=13428 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-12-02 20:28:56,256 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.063) 0:02:43.835 ****** 2025-12-02 20:28:56,256 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.063) 0:02:43.834 ****** 2025-12-02 20:28:56,289 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,303 p=13428 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-12-02 20:28:56,303 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.047) 0:02:43.882 ****** 2025-12-02 20:28:56,303 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.047) 0:02:43.881 ****** 2025-12-02 20:28:56,328 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,337 p=13428 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-12-02 20:28:56,337 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.034) 0:02:43.916 ****** 2025-12-02 20:28:56,337 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.033) 0:02:43.915 ****** 2025-12-02 20:28:56,365 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,381 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:56,381 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.043) 0:02:43.960 ****** 2025-12-02 20:28:56,381 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.043) 0:02:43.959 ****** 2025-12-02 20:28:56,444 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:56,457 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:56,457 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.076) 0:02:44.036 ****** 2025-12-02 20:28:56,457 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.076) 0:02:44.035 ****** 2025-12-02 20:28:56,530 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:56,544 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:56,544 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.086) 0:02:44.123 ****** 2025-12-02 20:28:56,544 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.086) 0:02:44.122 ****** 2025-12-02 20:28:56,653 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:56,683 p=13428 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-12-02 20:28:56,683 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.139) 0:02:44.262 ****** 2025-12-02 20:28:56,683 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.139) 0:02:44.261 ****** 2025-12-02 20:28:56,781 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:56,797 p=13428 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-12-02 20:28:56,797 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.113) 0:02:44.376 ****** 2025-12-02 20:28:56,797 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.113) 0:02:44.375 ****** 2025-12-02 20:28:56,897 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:56,910 p=13428 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-12-02 20:28:56,910 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.113) 0:02:44.489 ****** 2025-12-02 20:28:56,910 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:56 +0000 (0:00:00.113) 0:02:44.488 ****** 2025-12-02 20:28:56,982 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:28:57,013 p=13428 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-12-02 20:28:57,013 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.103) 0:02:44.593 ****** 2025-12-02 20:28:57,014 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.103) 0:02:44.591 ****** 2025-12-02 20:28:57,105 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:57,122 p=13428 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-12-02 20:28:57,122 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.108) 0:02:44.702 ****** 2025-12-02 20:28:57,122 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.108) 0:02:44.700 ****** 2025-12-02 20:28:57,274 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-12-02 20:28:57,274 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.151) 0:02:44.853 ****** 2025-12-02 20:28:57,274 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.151) 0:02:44.852 ****** 2025-12-02 20:28:57,512 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:57,522 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-12-02 20:28:57,522 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.248) 0:02:45.102 ****** 2025-12-02 20:28:57,522 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:57 +0000 (0:00:00.248) 0:02:45.100 ****** 2025-12-02 20:28:58,336 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:58,355 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-12-02 20:28:58,355 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:58 +0000 (0:00:00.832) 0:02:45.934 ****** 2025-12-02 20:28:58,355 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:58 +0000 (0:00:00.833) 0:02:45.933 ****** 2025-12-02 20:28:58,894 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:28:58,904 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-12-02 20:28:58,904 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:58 +0000 (0:00:00.548) 0:02:46.483 ****** 2025-12-02 20:28:58,904 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:58 +0000 (0:00:00.548) 0:02:46.482 ****** 2025-12-02 20:28:59,731 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:28:59,756 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-12-02 20:28:59,756 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:59 +0000 (0:00:00.852) 0:02:47.335 ****** 2025-12-02 20:28:59,756 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:28:59 +0000 (0:00:00.852) 0:02:47.334 ****** 2025-12-02 20:29:00,920 p=13428 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.144)] => (item=controller) 2025-12-02 20:29:01,664 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=crc) 2025-12-02 20:29:01,882 p=13428 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-12-02 20:29:01,898 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-12-02 20:29:01,898 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:01 +0000 (0:00:02.142) 0:02:49.478 ****** 2025-12-02 20:29:01,899 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:01 +0000 (0:00:02.142) 0:02:49.476 ****** 2025-12-02 20:29:01,970 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:29:01,982 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-12-02 20:29:01,982 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:01 +0000 (0:00:00.083) 0:02:49.561 ****** 2025-12-02 20:29:01,982 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:01 +0000 (0:00:00.083) 0:02:49.560 ****** 2025-12-02 20:29:02,772 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:29:02,791 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-12-02 20:29:02,792 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:02 +0000 (0:00:00.809) 0:02:50.371 ****** 2025-12-02 20:29:02,792 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:02 +0000 (0:00:00.809) 0:02:50.370 ****** 2025-12-02 20:29:02,848 p=13428 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-12-02 20:29:02,873 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-12-02 20:29:02,873 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:02 +0000 (0:00:00.081) 0:02:50.452 ****** 2025-12-02 20:29:02,873 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:02 +0000 (0:00:00.081) 0:02:50.451 ****** 2025-12-02 20:29:03,626 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=1) 2025-12-02 20:29:04,283 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=2) 2025-12-02 20:29:05,013 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=3) 2025-12-02 20:29:05,679 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=4) 2025-12-02 20:29:06,284 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=5) 2025-12-02 20:29:06,905 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=6) 2025-12-02 20:29:07,663 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=7) 2025-12-02 20:29:08,259 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=8) 2025-12-02 20:29:08,993 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=9) 2025-12-02 20:29:09,659 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=10) 2025-12-02 20:29:10,379 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=11) 2025-12-02 20:29:11,041 p=13428 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=12) 2025-12-02 20:29:11,070 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-12-02 20:29:11,070 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:11 +0000 (0:00:08.197) 0:02:58.649 ****** 2025-12-02 20:29:11,070 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:11 +0000 (0:00:08.197) 0:02:58.648 ****** 2025-12-02 20:29:11,632 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:29:11,649 p=13428 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-12-02 20:29:11,650 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:11 +0000 (0:00:00.579) 0:02:59.229 ****** 2025-12-02 20:29:11,650 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:11 +0000 (0:00:00.579) 0:02:59.228 ****** 2025-12-02 20:29:12,757 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:29:12,780 p=13428 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-12-02 20:29:12,781 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:01.131) 0:03:00.360 ****** 2025-12-02 20:29:12,781 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:01.130) 0:03:00.359 ****** 2025-12-02 20:29:12,824 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:29:12,833 p=13428 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-12-02 20:29:12,833 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:00.052) 0:03:00.412 ****** 2025-12-02 20:29:12,833 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:00.052) 0:03:00.411 ****** 2025-12-02 20:29:12,979 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-12-02 20:29:12,979 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:00.146) 0:03:00.559 ****** 2025-12-02 20:29:12,979 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:12 +0000 (0:00:00.146) 0:03:00.557 ****** 2025-12-02 20:29:13,024 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:29:13,047 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-12-02 20:29:13,047 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.067) 0:03:00.626 ****** 2025-12-02 20:29:13,047 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.067) 0:03:00.625 ****** 2025-12-02 20:29:13,102 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:29:13,114 p=13428 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-12-02 20:29:13,114 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.066) 0:03:00.693 ****** 2025-12-02 20:29:13,114 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.066) 0:03:00.692 ****** 2025-12-02 20:29:13,157 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:29:13,175 p=13428 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-12-02 20:29:13,175 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.061) 0:03:00.754 ****** 2025-12-02 20:29:13,175 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.061) 0:03:00.753 ****** 2025-12-02 20:29:13,265 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-12-02 20:29:13,265 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.090) 0:03:00.844 ****** 2025-12-02 20:29:13,265 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.090) 0:03:00.843 ****** 2025-12-02 20:29:13,317 p=13428 u=zuul n=ansible | ok: [localhost] => make_input_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-02 20:29:13,329 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-12-02 20:29:13,329 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.064) 0:03:00.908 ****** 2025-12-02 20:29:13,329 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.064) 0:03:00.907 ****** 2025-12-02 20:29:13,374 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:29:13,385 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-12-02 20:29:13,385 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.056) 0:03:00.965 ****** 2025-12-02 20:29:13,385 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:13 +0000 (0:00:00.056) 0:03:00.963 ****** 2025-12-02 20:29:13,471 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run.log 2025-12-02 20:29:16,563 p=13428 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-12-02 20:29:16,566 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:29:16,602 p=13428 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-12-02 20:29:16,602 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:03.216) 0:03:04.181 ****** 2025-12-02 20:29:16,602 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:03.216) 0:03:04.180 ****** 2025-12-02 20:29:16,681 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-12-02 20:29:16,681 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.079) 0:03:04.261 ****** 2025-12-02 20:29:16,681 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.079) 0:03:04.259 ****** 2025-12-02 20:29:16,733 p=13428 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_IMG: 38.102.83.20:5001/openstack-k8s-operators/openstack-operator-index:b102924657dd294d08db769acac26201e395a333 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-02 20:29:16,741 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-12-02 20:29:16,742 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.060) 0:03:04.321 ****** 2025-12-02 20:29:16,742 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.060) 0:03:04.320 ****** 2025-12-02 20:29:16,780 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:29:16,799 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-12-02 20:29:16,799 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.057) 0:03:04.378 ****** 2025-12-02 20:29:16,799 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:29:16 +0000 (0:00:00.057) 0:03:04.377 ****** 2025-12-02 20:29:16,876 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run.log 2025-12-02 20:32:57,229 p=13428 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-12-02 20:32:57,236 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:32:57,252 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-12-02 20:32:57,252 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:32:57 +0000 (0:03:40.453) 0:06:44.832 ****** 2025-12-02 20:32:57,253 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:32:57 +0000 (0:03:40.453) 0:06:44.831 ****** 2025-12-02 20:34:30,634 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:34:30,645 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-12-02 20:34:30,645 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:30 +0000 (0:01:33.392) 0:08:18.225 ****** 2025-12-02 20:34:30,646 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:30 +0000 (0:01:33.392) 0:08:18.223 ****** 2025-12-02 20:34:31,213 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:34:31,226 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-12-02 20:34:31,226 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:31 +0000 (0:00:00.580) 0:08:18.805 ****** 2025-12-02 20:34:31,226 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:31 +0000 (0:00:00.580) 0:08:18.804 ****** 2025-12-02 20:34:32,402 p=13428 u=zuul n=ansible | ok: [localhost] 2025-12-02 20:34:32,415 p=13428 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-12-02 20:34:32,415 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:01.189) 0:08:19.995 ****** 2025-12-02 20:34:32,416 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:01.189) 0:08:19.993 ****** 2025-12-02 20:34:32,518 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-12-02 20:34:32,519 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.103) 0:08:20.098 ****** 2025-12-02 20:34:32,519 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.103) 0:08:20.097 ****** 2025-12-02 20:34:32,556 p=13428 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-02 20:34:32,566 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-12-02 20:34:32,566 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.047) 0:08:20.145 ****** 2025-12-02 20:34:32,566 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.047) 0:08:20.144 ****** 2025-12-02 20:34:32,601 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:34:32,611 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-12-02 20:34:32,612 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.045) 0:08:20.191 ****** 2025-12-02 20:34:32,612 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:34:32 +0000 (0:00:00.045) 0:08:20.190 ****** 2025-12-02 20:34:32,689 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_openstack.log 2025-12-02 20:37:36,632 p=13428 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-12-02 20:37:36,633 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:37:36,647 p=13428 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-12-02 20:37:36,647 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:03:04.035) 0:11:24.227 ****** 2025-12-02 20:37:36,647 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:03:04.035) 0:11:24.225 ****** 2025-12-02 20:37:36,670 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:37:36,681 p=13428 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-12-02 20:37:36,681 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.033) 0:11:24.260 ****** 2025-12-02 20:37:36,681 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.033) 0:11:24.259 ****** 2025-12-02 20:37:36,726 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:37:36,736 p=13428 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-12-02 20:37:36,736 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.055) 0:11:24.315 ****** 2025-12-02 20:37:36,736 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.055) 0:11:24.314 ****** 2025-12-02 20:37:36,811 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-12-02 20:37:36,811 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.074) 0:11:24.390 ****** 2025-12-02 20:37:36,811 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.075) 0:11:24.389 ****** 2025-12-02 20:37:36,866 p=13428 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-02 20:37:36,876 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-12-02 20:37:36,877 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.065) 0:11:24.456 ****** 2025-12-02 20:37:36,877 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.065) 0:11:24.455 ****** 2025-12-02 20:37:36,903 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:37:36,913 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-12-02 20:37:36,913 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.036) 0:11:24.492 ****** 2025-12-02 20:37:36,913 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:36 +0000 (0:00:00.036) 0:11:24.491 ****** 2025-12-02 20:37:36,999 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run_openstack_deploy.log 2025-12-02 20:37:38,632 p=13428 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-12-02 20:37:38,635 p=13428 u=zuul n=ansible | changed: [localhost] 2025-12-02 20:37:38,657 p=13428 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-12-02 20:37:38,657 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:01.744) 0:11:26.236 ****** 2025-12-02 20:37:38,657 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:01.744) 0:11:26.235 ****** 2025-12-02 20:37:38,731 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-12-02 20:37:38,731 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.074) 0:11:26.310 ****** 2025-12-02 20:37:38,731 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.073) 0:11:26.309 ****** 2025-12-02 20:37:38,787 p=13428 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INFRA_BRANCH: '' INFRA_REPO: /home/zuul/src/github.com/openstack-k8s-operators/infra-operator INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-12-02 20:37:38,797 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-12-02 20:37:38,797 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.066) 0:11:26.377 ****** 2025-12-02 20:37:38,797 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.066) 0:11:26.375 ****** 2025-12-02 20:37:38,842 p=13428 u=zuul n=ansible | skipping: [localhost] 2025-12-02 20:37:38,863 p=13428 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-12-02 20:37:38,863 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.065) 0:11:26.442 ****** 2025-12-02 20:37:38,863 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:37:38 +0000 (0:00:00.065) 0:11:26.441 ****** 2025-12-02 20:37:38,950 p=13428 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run_netconfig.log 2025-12-02 20:39:30,702 p=13428 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-12-02 20:39:30,706 p=13428 u=zuul n=ansible | An exception occurred during task execution. To see the full traceback, use -vvv. The error was: NoneType: None 2025-12-02 20:39:30,713 p=13428 u=zuul n=ansible | fatal: [localhost]: FAILED! => attempts: 1 changed: true msg: non-zero return code rc: 2 stderr: '' stderr_lines: [] stdout: | ~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml namespace/openstack unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" NAME DISPLAY NAME STATUS openstack Active oc project openstack Already on project "openstack" on server "https://api.crc.testing:6443". bash scripts/gen-input-kustomize.sh + OUT=/home/zuul/ci-framework-data/artifacts/manifests + '[' -z openstack ']' + '[' -z osp-secret ']' + '[' -z 12345678 ']' + '[' -z 1234567842 ']' + '[' -z 767c3ed056cbaa3b9dfedb8c6f825bf0 ']' + '[' -z sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= ']' + '[' -z COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f ']' + '[' -z openstack ']' + '[' -z libvirt-secret ']' + DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack/input + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/input ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/input ~/ci-framework-data/artifacts/manifests/openstack/input ~/src/github.com/openstack-k8s-operators/install_yamls + cat oc get secret/osp-secret || oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/input | oc apply -f - NAME TYPE DATA AGE osp-secret Opaque 27 8m25s oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/infra/op /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr bash scripts/clone-operator-repo.sh Cloning repo: git clone /home/zuul/src/github.com/openstack-k8s-operators/infra-operator infra-operator Cloning into 'infra-operator'... done. cp /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr bash scripts/gen-service-kustomize.sh +++ dirname scripts/gen-service-kustomize.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only ++ set -e + '[' -z openstack ']' + '[' -z NetConfig ']' + '[' -z osp-secret ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + '[' -n '' ']' + REPLACEMENTS= + IMAGE=unused + IMAGE_PATH=containerImage + STORAGE_REQUEST=10G + INTERFACE_MTU=1500 + VLAN_START=20 + VLAN_STEP=1 + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ~/ci-framework-data/artifacts/manifests/openstack/infra/cr ~/src/github.com/openstack-k8s-operators/install_yamls + cat + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + IFS=, + read -ra IMAGES + IFS=, + read -ra IMAGE_PATHS + '[' 1 '!=' 1 ']' + (( i=0 )) + (( i < 1 )) + SPEC_PATH=containerImage + SPEC_VALUE=unused + '[' unused '!=' unused ']' + (( i++ )) + (( i < 1 )) + '[' -n '' ']' + '[' NetConfig == OpenStackControlPlane ']' + '[' NetConfig == Galera ']' + '[' NetConfig == NetConfig ']' + '[' -z true ']' + IPV6_SUBNET_INDEX=1 + VLAN_INTERNALAPI=20 + VLAN_STORAGE=21 + VLAN_TENANT=22 + VLAN_STORAGEMGMT=23 + cat + '[' -n true ']' + cat + REPLACEMENTS=' - source: kind: ConfigMap name: vlan-config fieldPath: data.internalapi targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=internalapi].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storage targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storage].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storagemgmt targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storagemgmt].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.tenant targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=tenant].subnets.0.vlan' + '[' -z true ']' + '[' -n '' ']' + '[' -n '' ']' + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + '[' -n ' - source: kind: ConfigMap name: vlan-config fieldPath: data.internalapi targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=internalapi].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storage targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storage].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storagemgmt targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storagemgmt].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.tenant targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=tenant].subnets.0.vlan' ']' + cat + kustomization_add_resources + echo merge config dir merge config dir ++ find . -type f -name '*.yaml' ++ grep -v kustomization + yamls='./network_v1beta1_netconfig.yaml ./vlan-config.yaml' + for y in ${yamls[@]} + kustomize edit add resource ./network_v1beta1_netconfig.yaml + for y in ${yamls[@]} + kustomize edit add resource ./vlan-config.yaml + popd ~/src/github.com/openstack-k8s-operators/install_yamls make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z infra ']' + '[' infra = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z infra ']' + '[' infra = rabbitmq-cluster ']' + DEPL_NAME=infra-operator-controller-manager ++ oc get -n openstack-operators deployment infra-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-deploy-resources.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + NEXT_WAIT_TIME=0 + '[' 0 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 0 + '[' 1 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 1 + '[' 2 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 2 + '[' 3 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 3 + '[' 4 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 4 + '[' 5 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 5 + '[' 6 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 6 + '[' 7 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 7 + '[' 8 -eq 15 ']' + oc apply -f - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 8 + '[' 9 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 9 + '[' 10 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 10 + '[' 11 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 11 + '[' 12 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 12 + '[' 13 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 13 + '[' 14 -eq 15 ']' + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr + oc apply -f - Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource + sleep 14 + '[' 15 -eq 15 ']' + '[' 15 -lt 15 ']' make: *** [Makefile:1165: netconfig_deploy] Error 1 stdout_lines: - ~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts - bash scripts/gen-namespace.sh - + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' - + '[' -z openstack ']' - + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack - + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' - + cat - oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml - namespace/openstack unchanged - timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" - NAME DISPLAY NAME STATUS - openstack Active - oc project openstack - Already on project "openstack" on server "https://api.crc.testing:6443". - bash scripts/gen-input-kustomize.sh - + OUT=/home/zuul/ci-framework-data/artifacts/manifests - + '[' -z openstack ']' - + '[' -z osp-secret ']' - + '[' -z 12345678 ']' - + '[' -z 1234567842 ']' - + '[' -z 767c3ed056cbaa3b9dfedb8c6f825bf0 ']' - + '[' -z sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= ']' - + '[' -z COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f ']' - + '[' -z openstack ']' - + '[' -z libvirt-secret ']' - + DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack/input - + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/input ']' - + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/input - ~/ci-framework-data/artifacts/manifests/openstack/input ~/src/github.com/openstack-k8s-operators/install_yamls - + cat - oc get secret/osp-secret || oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/input | oc apply -f - - NAME TYPE DATA AGE - osp-secret Opaque 27 8m25s - oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr | oc delete --ignore-not-found=true -f - - 'error: must build at directory: not a valid directory: evalsymlink failure on ''/home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr'' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra: no such file or directory' - No resources found - rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/infra/op /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - bash scripts/clone-operator-repo.sh - 'Cloning repo: git clone /home/zuul/src/github.com/openstack-k8s-operators/infra-operator infra-operator' - Cloning into 'infra-operator'... - done. - cp /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - bash scripts/gen-service-kustomize.sh - +++ dirname scripts/gen-service-kustomize.sh - ++ cd scripts - ++ pwd -P - + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts - + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only - ++ set -e - + '[' -z openstack ']' - + '[' -z NetConfig ']' - + '[' -z osp-secret ']' - + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' - + '[' -n '' ']' - + REPLACEMENTS= - + IMAGE=unused - + IMAGE_PATH=containerImage - + STORAGE_REQUEST=10G - + INTERFACE_MTU=1500 - + VLAN_START=20 - + VLAN_STEP=1 - + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' - + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - ~/ci-framework-data/artifacts/manifests/openstack/infra/cr ~/src/github.com/openstack-k8s-operators/install_yamls - + cat - + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] - + IFS=, - + read -ra IMAGES - + IFS=, - + read -ra IMAGE_PATHS - + '[' 1 '!=' 1 ']' - + (( i=0 )) - + (( i < 1 )) - + SPEC_PATH=containerImage - + SPEC_VALUE=unused - + '[' unused '!=' unused ']' - + (( i++ )) - + (( i < 1 )) - + '[' -n '' ']' - + '[' NetConfig == OpenStackControlPlane ']' - + '[' NetConfig == Galera ']' - + '[' NetConfig == NetConfig ']' - + '[' -z true ']' - + IPV6_SUBNET_INDEX=1 - + VLAN_INTERNALAPI=20 - + VLAN_STORAGE=21 - + VLAN_TENANT=22 - + VLAN_STORAGEMGMT=23 - + cat - + '[' -n true ']' - + cat - + REPLACEMENTS=' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.internalapi' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=internalapi].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.storage' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=storage].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.storagemgmt' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=storagemgmt].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.tenant' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=tenant].subnets.0.vlan''' - + '[' -z true ']' - + '[' -n '' ']' - + '[' -n '' ']' - + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] - + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] - + '[' -n ' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.internalapi' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=internalapi].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.storage' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=storage].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.storagemgmt' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=storagemgmt].subnets.0.vlan' - '- source:' - ' kind: ConfigMap' - ' name: vlan-config' - ' fieldPath: data.tenant' - ' targets:' - ' - select:' - ' kind: NetConfig' - ' fieldPaths:' - ' - spec.networks.[name=tenant].subnets.0.vlan'' '']''' - + cat - + kustomization_add_resources - + echo merge config dir - merge config dir - ++ find . -type f -name '*.yaml' - ++ grep -v kustomization - + yamls='./network_v1beta1_netconfig.yaml - ./vlan-config.yaml' - + for y in ${yamls[@]} - + kustomize edit add resource ./network_v1beta1_netconfig.yaml - + for y in ${yamls[@]} - + kustomize edit add resource ./vlan-config.yaml - + popd - ~/src/github.com/openstack-k8s-operators/install_yamls - make wait - 'make[1]: Entering directory ''/home/zuul/src/github.com/openstack-k8s-operators/install_yamls''' - bash scripts/operator-wait.sh - + TIMEOUT=500s - +++ dirname scripts/operator-wait.sh - ++ cd scripts - ++ pwd -P - + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts - + '[' -z openstack-operators ']' - + '[' -z infra ']' - + '[' infra = rabbitmq ']' - + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts - ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls - + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' - + '[' -z openstack-operators ']' - + '[' -z infra ']' - + '[' infra = rabbitmq-cluster ']' - + DEPL_NAME=infra-operator-controller-manager - ++ oc get -n openstack-operators deployment infra-operator-controller-manager -o json - ++ jq -e .status.availableReplicas - + REPLICAS=1 - + '[' 1 '!=' 1 ']' - + echo Succeeded - + exit 0 - + rc=0 - + popd - ~/src/github.com/openstack-k8s-operators/install_yamls - + exit 0 - 'make[1]: Leaving directory ''/home/zuul/src/github.com/openstack-k8s-operators/install_yamls''' - bash scripts/operator-deploy-resources.sh - + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' - + NEXT_WAIT_TIME=0 - + '[' 0 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 0 - + '[' 1 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 1 - + '[' 2 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 2 - + '[' 3 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 3 - + '[' 4 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 4 - + '[' 5 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 5 - + '[' 6 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 6 - + '[' 7 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 7 - + '[' 8 -eq 15 ']' - + oc apply -f - - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 8 - + '[' 9 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 9 - + '[' 10 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 10 - + '[' 11 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 11 - + '[' 12 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 12 - + '[' 13 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 13 - + '[' 14 -eq 15 ']' - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr - + oc apply -f - - 'Error from server (InternalError): error when creating "STDIN": Internal error occurred: failed calling webhook "mnetconfig-v1beta1.kb.io": failed to call webhook: the server could not find the requested resource' - + sleep 14 - + '[' 15 -eq 15 ']' - + '[' 15 -lt 15 ']' - 'make: *** [Makefile:1165: netconfig_deploy] Error 1' 2025-12-02 20:39:30,715 p=13428 u=zuul n=ansible | NO MORE HOSTS LEFT ************************************************************* 2025-12-02 20:39:30,716 p=13428 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | localhost : ok=179 changed=60 unreachable=0 failed=1 skipped=118 rescued=0 ignored=1 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:39:30 +0000 (0:01:51.853) 0:13:18.296 ****** 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | =============================================================================== 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 220.45s 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------ 184.04s 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ---------------------------- 111.85s 2025-12-02 20:39:30,717 p=13428 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 93.39s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 36.33s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 28.47s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 22.41s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 8.44s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 8.20s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.49s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 3.96s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | install_yamls_makes : Run input ----------------------------------------- 3.22s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | openshift_setup : Create required namespaces ---------------------------- 2.58s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_local_storage : Fetch hostnames for all hosts ------------------------ 2.14s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | rhol_crc : Restart DNS in CRC VM ---------------------------------------- 1.95s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | rhol_crc : Check if using systemd dnsmasq ------------------------------- 1.86s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | install_yamls_makes : Run openstack_deploy_prep ------------------------- 1.74s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | install_ca : Update ca bundle ------------------------------------------- 1.69s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_setup : Manage directories ------------------------------------------- 1.29s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | Gathering Facts --------------------------------------------------------- 1.24s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | Tuesday 02 December 2025 20:39:30 +0000 (0:01:51.854) 0:13:18.296 ****** 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | =============================================================================== 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 521.87s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | edpm_prepare ----------------------------------------------------------- 95.87s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | run_hook --------------------------------------------------------------- 40.67s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 36.94s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 31.49s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 18.30s 2025-12-02 20:39:30,718 p=13428 u=zuul n=ansible | ci_local_storage ------------------------------------------------------- 15.51s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | rhol_crc ---------------------------------------------------------------- 9.34s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 6.76s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | openshift_login --------------------------------------------------------- 6.57s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 4.41s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 2.73s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | install_ca -------------------------------------------------------------- 2.06s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 1.64s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 1.24s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 0.83s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | manage_secrets ---------------------------------------------------------- 0.63s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.50s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.34s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.33s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.12s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.09s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.03s 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2025-12-02 20:39:30,719 p=13428 u=zuul n=ansible | total ----------------------------------------------------------------- 798.26s